EP2116499A1 - Elevator security system - Google Patents
Elevator security system Download PDFInfo
- Publication number
- EP2116499A1 EP2116499A1 EP07713926A EP07713926A EP2116499A1 EP 2116499 A1 EP2116499 A1 EP 2116499A1 EP 07713926 A EP07713926 A EP 07713926A EP 07713926 A EP07713926 A EP 07713926A EP 2116499 A1 EP2116499 A1 EP 2116499A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- image data
- suspicious person
- date
- user
- time information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000005070 sampling Methods 0.000 claims abstract description 30
- 230000001815 facial effect Effects 0.000 claims abstract description 10
- 230000004044 response Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000000034 method Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B5/00—Applications of checking, fault-correcting, or safety devices in elevators
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B1/00—Control systems of elevators in general
- B66B1/34—Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
- B66B1/46—Adaptations of switches or switchgear
- B66B1/468—Call registering systems
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B5/00—Applications of checking, fault-correcting, or safety devices in elevators
- B66B5/0006—Monitoring devices or performance analysers
- B66B5/0012—Devices monitoring the users of the elevator system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B2201/00—Aspects of control systems of elevators
- B66B2201/40—Details of the change of control mode
- B66B2201/46—Switches or switchgear
- B66B2201/4607—Call registering systems
- B66B2201/4676—Call registering systems for checking authorization of the passengers
Definitions
- the present invention relates to an elevator security system that includes an authenticating apparatus that authenticates permission to use an elevator.
- the present invention aims to solve the above problems and an object of the present invention is to provide an elevator security system that enables improvements in security by determining whether or not an elevator user is a suspicious person.
- an elevator security system characterized in including: an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed; a security camera for photographing a user who performs the authorizing operation; a processor including: a recording medium in which stored information is stored that includes suspicious person image data for identifying a suspicious person; a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; and a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and also that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made
- an elevator security system because facial portion image data of a user are sampled as sampled image data by the sampling portion only if the authentication result is "failed", and sampled image data that have been sampled in the past are stored in the recording medium as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data from the sampling portion are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily.
- use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.
- FIG 1 is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention.
- An elevator that moves a car inside a hoistway elevator is disposed in a building. The car can be stopped at a plurality of floors by control from an elevator control board 1.
- An elevator authenticating apparatus 2 is disposed on a predetermined floor (in this example, a first floor (1F) which is a lobby floor.
- the authenticating apparatus 2 authenticates permission to use the elevator in response to a predetermined authorizing operation being performed.
- a predetermined authorizing operation include operations such as holding a card on which personal information is registered, or a key, etc., over the authenticating apparatus 2, for example.
- the authenticating apparatus 2 When the permission to use the elevator is authenticated, the authenticating apparatus 2 generates authenticating information 21 that includes an authentication result that is either "passed” or "failed".
- the authenticating apparatus 2 has a clock function, and generates date and time information 22 that corresponds to the date and time that the authorizing operation was performed when the authorizing operation is performed.
- the authenticating information 21 is sent from the authenticating apparatus 2 to the elevator control board 1. If the authentication result from the authenticating apparatus 2 is "failed", the elevator control board 1 disables call registration by the operation of landing buttons (not shown), and releases the disabling of call registration only if the authentication result from the authenticating apparatus 2 is "passed”.
- a security camera 3 for photographing users that perform the authorizing operation on the authenticating apparatus 2 is disposed on the floor on which the authenticating apparatus 2 is disposed (the lobby floor).
- the security camera 3 photographs a predetermined range in the vicinity of the authenticating apparatus 2.
- the security camera 3 is also capable of serial photography.
- the security camera 3 constantly outputs image data 23 that are obtained by that photography.
- the authenticating information 21, the date and time information 22, and the image data 23 are sent to a processor 4.
- the processor 4 performs processes related to the determination of whether or not the user is a suspicious person based on the authenticating information 21, the date and time information 22, and the image data 23.
- the processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 7.
- Stored information that includes suspicious person image data for identifying suspicious persons is stored in the recording medium 5.
- the suspicious person image data that are stored in the recording medium 5 are also associated with the date and time information and saved.
- the sampling portion 6 determines the ability to process the image data 23 from the security camera 3 based on the authenticating information 21. Specifically, the sampling portion 6 performs processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "failed", and stops the processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "passed". In other words, processing of the image data 23 by the sampling portion 6 is performed by sampling image data from a facial portion of the user in the image data 23 as sampled image data 24 only if the authentication that is performed by the authenticating apparatus 2 results in a denial of permission. The sampled image data 24 that have been sampled by the processing of the sampling portion 6 are sent to the determining portion 7 from the sampling portion 6.
- the determining portion 7 receives the sampled image data 24 from the sampling portion 6 and the date and time information 22 from the authenticating apparatus 2.
- the determining portion 7 has a searching portion 8.
- the searching portion 8 searches whether or not identifying image data that can be recognized as identical to the sampled image data 24 (i.e., image data that identify a facial portion that is identical to the facial portion of the user identified by the sampled image data 24) are present as suspicious person image data in the stored information.
- the method for searching the stored information is not dependent on any specific method, provided that the algorithm outputs presence or absence of identifying image data as a search result.
- the searching portion 8 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. If the identifying image data are present as suspicious person image data in the stored information, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data.
- sampled image data (facial portion image data) of users whose authentication result in the authenticating apparatus 2 was “failed” are accumulated as suspicious person image data in the recording medium 5, and the date and time information when the authentication result was "failed” is accumulated so as to be associated with the suspicious person image data.
- the determining portion 7 determines whether or not the user who performed the authorizing operation is a suspicious person based on the search results from the searching portion 8. Specifically, the determining portion 7 determines that the user is a legitimate user if the presence of identifying image data is negated by the searching portion 8 (i.e., if identifying image data are not present as suspicious person image data in the stored information). The determining portion 7 determines that the user is a suspicious person if the presence of identifying image data is found by the searching portion 8 (i.e., if identifying image data are present as suspicious person image data in the stored information).
- the determining portion 7 outputs the sampled image data 24 to an alarm device 9 as warning image data 25 only when it has determined that the user is a suspicious person.
- the processor 4 is constituted by a computer that has: an arithmetic processing portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion.
- the functions of the sampling portion 6 and the determining portion 7 are implemented by the computer of the processor 4. That is, programs for implementing the functions of the sampling portion 6 and the determining portion 7 are stored in the storage portion of the computer.
- the data processing portion executes arithmetic processing that relates to the functions of the processor 4 based on the programs that are stored in the storage portion.
- the alarm device 9 is disposed at a predetermined position in a vicinity of the authenticating apparatus 2.
- the alarm device 9 generates an alarm that indicates that the user is a suspicious person in response to receiving warning image data 25 from the determining portion 7.
- the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (i.e., the sampled image data) as a warning.
- the alarm device 9 issues a warning sound together with the display of the image on the display portion 10.
- processing of the image data 23 is performed by the sampling portion 6. Facial portion image data of the user from the image data 23 of the security camera 3 is thereby sampled as sampled image data 24.
- the sampled image data 24 that has been sampled by the sampling portion 6 is sent to the determining portion 7. Next, whether the user is a suspicious person or not is determined by the determining portion 7 based on the sampled image data 24. If it is determined that the user is a suspicious person, the sampled image data 24 are sent from the determining portion 7 to the alarm device 9 as warning image data 25. Thus, the image that is obtained from the warning image data 25 is displayed on the display portion 10 as a warning. At that point, the warning sound issues from the warning device 9.
- Figure 2 is a flowchart that shows actions of the determining portion 7 from Figure 1 .
- the searching portion 8 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S2).
- the searching portion 8 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S3). In that case, the determining portion 7 determines that the user is not a suspicious person (S4).
- the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in the recording medium 5 so as to be associated with the identifying image data (S5).
- the determining portion 7 determines that the user is a suspicious person (S6), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S7). Processing by the determining portion 7 is performed in this manner.
- the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (the sampled image data) as a warning, the warning that indicates that the person is suspicious can be presented visually, facilitating identification of the suspicious person to whom the warning refers.
- the alarm device 9 is installed in the vicinity of the authenticating apparatus 2, but the alarm device 9 may also be installed in a control room of the building.
- the warning from the alarm device 9 can thereby be transmitted to a controller who is stationed inside the control room, enabling elevator security to be improved further.
- FIG 3 is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention.
- a processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 31. Configuration of the recording medium 5 and the sampling portion 6 is similar to that of the recording medium 5 and the sampling portion 6 according to Embodiment 1.
- the determining portion 31 has a searching portion 32 and a condition comparing portion 33.
- the searching portion 32 searches whether or not identifying image data (i.e., image data that can be recognized as identical to the sampled image data 24) are present as suspicious person image data in the stored information in the recording medium 5. As a result of the search, if identifying image data are not present as suspicious person image data in the stored information, the searching portion 32 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24.
- identifying image data i.e., image data that can be recognized as identical to the sampled image data 24
- the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data, and outputs the sampled image data 24, the past date and time information that has been linked to the identifying image data, and the date and time information 22 from the authenticating apparatus 2 to the condition comparing portion 33 as suspicious person candidate information 26.
- the condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies preset suspicious person qualifying conditions.
- condition comparing portion 33 obtains the count of past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (Count), and compares the obtained count of past date and time information (Count) and a set count value (a predetermined threshold value) (TH1) that has been preset.
- the condition comparing portion 33 also obtains the past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (the newest past date and time information item if more than one past date and time information item exists) and the date and time information 22 from the authenticating apparatus 2, and compares a time difference between the obtained past date and time information and the date and time information 22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined threshold value) (TH2) that has been preset.
- the set time value can be set to one minute, for example.
- the condition comparing portion 33 determines that the user does not satisfy the suspicious person qualifying conditions only if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (1) and a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (3).
- the condition comparing portion 33 determines that the user satisfies the suspicious person qualifying conditions if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (2), or a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (4).
- the determining portion 31 determines that the user is a suspicious person only if the condition comparing portion 33 has made a determination that the user satisfies the suspicious person qualifying conditions.
- the determining portion 31 also outputs the sampled image data 24 that is included in the suspicious person candidate information 26 to the alarm device 9 as warning image data 25 only if it has been determined that the user is a suspicious person.
- the rest of the configuration is similar to that of Embodiment 1.
- Figure 4 is a flowchart that shows actions of the determining portion 31 from Figure 3 .
- the searching portion 32 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S12).
- the searching portion 32 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S13). In that case, the determining portion 31 determines that the user is not a suspicious person (S14).
- the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in stored in the recording medium 5 so as to be associated with the identifying image data (S15). In that case, suspicious person candidate information 26 is sent from the searching portion 32 to the condition comparing portion 33.
- condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies the suspicious person qualifying conditions (S16). If the suspicious person qualifying conditions are not satisfied, the determining portion 31 determines that the user is not a suspicious person (S14).
- the determining portion 31 determines that the user is a suspicious person (S17), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S18). Processing by the determining portion 31 is performed in this manner.
- the determining portion 31 determines whether or not a user is a suspicious person by comparing a count of past date and time information that has been associated with the identifying image data and a predetermined threshold value, it is possible to designate as a suspicious person only a user for whom the authentication result has been "flailed" frequently. Consequently, legitimate users who have accidentally had an authentication result "failed" in the past can be excluded from being treated as suspicious persons, enabling erroneous determinations to be prevented.
- the determining portion 31 determines whether or not a user is a suspicious person by comparing a time difference between past date and time information that has been associated with the identifying image data and date and time information 22 from the authenticating apparatus 2 with a predetermined threshold value, it can be determined that a user is a suspicious person when an authentication result is repeatedly "failed" a number of times in a short time, enabling accuracy in determining whether or not someone is a suspicious person to be improved.
- the configuration may also be such that elevator running information is transmitted to the display portion 10 from the elevator control board 1, and the display portion 10 displays the elevator running information during normal operation, and display images that are obtained from the suspicious person image data instead of the elevator running information or together with the elevator running information when warning image data 25 is input.
Landscapes
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Maintenance And Inspection Apparatuses For Elevators (AREA)
- Indicating And Signalling Devices For Elevators (AREA)
Abstract
Description
- The present invention relates to an elevator security system that includes an authenticating apparatus that authenticates permission to use an elevator.
- Conventionally, elevator security systems have been proposed in which an area around an authenticating apparatus that authenticates permission to use an elevator is photographed by a security camera when a predetermined operation is performed on the authenticating apparatus. In these conventional elevator security systems, a date and time that the operation was performed on the authenticating apparatus, and an authentication result, etc., are displayed on a display portion (See Patent Literature 1).
-
- [Patent Literature 1]
Japanese Patent Laid-Open No.2006-103854 - However, in conventional elevator security systems, because the date and time and the authentication result are only displayed on the display portion, it is not possible to decide if an elevator user is a suspicious person or if the person has simply pressed a wrong button.
- The present invention aims to solve the above problems and an object of the present invention is to provide an elevator security system that enables improvements in security by determining whether or not an elevator user is a suspicious person.
- In order to achieve the above object, according to one aspect of the present invention, there is provided an elevator security system characterized in including: an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed; a security camera for photographing a user who performs the authorizing operation; a processor including: a recording medium in which stored information is stored that includes suspicious person image data for identifying a suspicious person; a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; and a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and also that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion that the user is a suspicious person.
- In an elevator security system according to the present invention, because facial portion image data of a user are sampled as sampled image data by the sampling portion only if the authentication result is "failed", and sampled image data that have been sampled in the past are stored in the recording medium as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data from the sampling portion are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.
-
-
Figure 1 is a block diagram that shows an elevator security system according toEmbodiment 1 of the present invention; -
Figure 2 is a flowchart that shows actions of a determining portion fromFigure 1 ; -
Figure 3 is a block diagram that shows an elevator security system according toEmbodiment 2 of the present invention; and -
Figure 4 is a flowchart for explaining processing actions of a determining portion fromFigure 3 . - Preferred embodiments of the present invention will now be explained with reference to the drawings.
-
Figure 1 is a block diagram that shows an elevator security system according toEmbodiment 1 of the present invention. An elevator that moves a car inside a hoistway elevator is disposed in a building. The car can be stopped at a plurality of floors by control from anelevator control board 1. Anelevator authenticating apparatus 2 is disposed on a predetermined floor (in this example, a first floor (1F) which is a lobby floor. - The
authenticating apparatus 2 authenticates permission to use the elevator in response to a predetermined authorizing operation being performed. Examples of a predetermined authorizing operation include operations such as holding a card on which personal information is registered, or a key, etc., over theauthenticating apparatus 2, for example. - When the permission to use the elevator is authenticated, the
authenticating apparatus 2 generatesauthenticating information 21 that includes an authentication result that is either "passed" or "failed". Theauthenticating apparatus 2 has a clock function, and generates date andtime information 22 that corresponds to the date and time that the authorizing operation was performed when the authorizing operation is performed. - The
authenticating information 21 is sent from theauthenticating apparatus 2 to theelevator control board 1. If the authentication result from theauthenticating apparatus 2 is "failed", theelevator control board 1 disables call registration by the operation of landing buttons (not shown), and releases the disabling of call registration only if the authentication result from theauthenticating apparatus 2 is "passed". - A
security camera 3 for photographing users that perform the authorizing operation on theauthenticating apparatus 2 is disposed on the floor on which theauthenticating apparatus 2 is disposed (the lobby floor). Thesecurity camera 3 photographs a predetermined range in the vicinity of theauthenticating apparatus 2.
Thesecurity camera 3 is also capable of serial photography. In addition, thesecurity camera 3 constantly outputsimage data 23 that are obtained by that photography. - The
authenticating information 21, the date andtime information 22, and theimage data 23 are sent to aprocessor 4. Theprocessor 4 performs processes related to the determination of whether or not the user is a suspicious person based on theauthenticating information 21, the date andtime information 22, and theimage data 23. Theprocessor 4 has arecording medium 5, asampling portion 6, and a determiningportion 7. - Stored information that includes suspicious person image data for identifying suspicious persons is stored in the
recording medium 5. The suspicious person image data that are stored in therecording medium 5 are also associated with the date and time information and saved. - The
sampling portion 6 determines the ability to process theimage data 23 from thesecurity camera 3 based on theauthenticating information 21. Specifically, thesampling portion 6 performs processing of theimage data 23 if the authentication result from theauthenticating apparatus 2 is "failed", and stops the processing of theimage data 23 if the authentication result from theauthenticating apparatus 2 is "passed". In other words, processing of theimage data 23 by thesampling portion 6 is performed by sampling image data from a facial portion of the user in theimage data 23 as sampledimage data 24 only if the authentication that is performed by theauthenticating apparatus 2 results in a denial of permission. The sampledimage data 24 that have been sampled by the processing of thesampling portion 6 are sent to the determiningportion 7 from thesampling portion 6. - The determining
portion 7 receives the sampledimage data 24 from thesampling portion 6 and the date andtime information 22 from theauthenticating apparatus 2. The determiningportion 7 has a searchingportion 8. The searchingportion 8 searches whether or not identifying image data that can be recognized as identical to the sampled image data 24 (i.e., image data that identify a facial portion that is identical to the facial portion of the user identified by the sampled image data 24) are present as suspicious person image data in the stored information. Moreover, the method for searching the stored information is not dependent on any specific method, provided that the algorithm outputs presence or absence of identifying image data as a search result. - If identifying image data are not present as suspicious person image data in the stored information, the
searching portion 8 records the sampledimage data 24 as suspicious person image data in therecording medium 5, and also records the date andtime information 22 from theauthenticating apparatus 2 in therecording medium 5 so as to be associated with the sampledimage data 24. If the identifying image data are present as suspicious person image data in the stored information, thesearching portion 8 adds the date andtime information 22 from theauthenticating apparatus 2 to past date and time information that has been associated with the identifying image data. - In this manner, among users who have operated the
authenticating apparatus 2 in the past, sampled image data (facial portion image data) of users whose authentication result in theauthenticating apparatus 2 was "failed" are accumulated as suspicious person image data in therecording medium 5, and the date and time information when the authentication result was "failed" is accumulated so as to be associated with the suspicious person image data. - The determining
portion 7 determines whether or not the user who performed the authorizing operation is a suspicious person based on the search results from the searchingportion 8. Specifically, the determiningportion 7 determines that the user is a legitimate user if the presence of identifying image data is negated by the searching portion 8 (i.e., if identifying image data are not present as suspicious person image data in the stored information). The determiningportion 7 determines that the user is a suspicious person if the presence of identifying image data is found by the searching portion 8 (i.e., if identifying image data are present as suspicious person image data in the stored information). - The determining
portion 7 outputs the sampledimage data 24 to analarm device 9 aswarning image data 25 only when it has determined that the user is a suspicious person. - Moreover, the
processor 4 is constituted by a computer that has: an arithmetic processing portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion. The functions of thesampling portion 6 and the determiningportion 7 are implemented by the computer of theprocessor 4. That is, programs for implementing the functions of thesampling portion 6 and the determiningportion 7 are stored in the storage portion of the computer. The data processing portion executes arithmetic processing that relates to the functions of theprocessor 4 based on the programs that are stored in the storage portion. - The
alarm device 9 is disposed at a predetermined position in a vicinity of theauthenticating apparatus 2. Thealarm device 9 generates an alarm that indicates that the user is a suspicious person in response to receivingwarning image data 25 from the determiningportion 7. In addition, thealarm device 9 has adisplay portion 10 that displays an image that is obtained from the warning image data 25 (i.e., the sampled image data) as a warning. Thealarm device 9 issues a warning sound together with the display of the image on thedisplay portion 10. - Next, operation will be explained. Photography by a
security camera 3 is performed continuously on the floor on which theauthenticating apparatus 2 is disposed (the lobby floor). Thus,image data 23 from thesecurity camera 3 is sent to thesampling portion 6 continuously. Processing of theimage data 23 is not performed by thesampling portion 6 and output of sampledimage data 24 from thesampling portion 6 is stopped if an authorizing operation has not been performed on the authenticatingapparatus 2. - When an authorizing operation is performed on the authenticating
apparatus 2 by a user, permission to use the elevator is authenticated by the authenticatingapparatus 2. If the authentication result is "failed" (i.e., the authentication returns that use of the elevator is not permitted), then call registration by operation of the landing buttons is disabled by control from theelevator control board 1. Consequently, call registration cannot be performed even if the landing buttons are operated. - In that case, processing of the
image data 23 is performed by thesampling portion 6. Facial portion image data of the user from theimage data 23 of thesecurity camera 3 is thereby sampled as sampledimage data 24. - The sampled
image data 24 that has been sampled by thesampling portion 6 is sent to the determiningportion 7. Next, whether the user is a suspicious person or not is determined by the determiningportion 7 based on the sampledimage data 24. If it is determined that the user is a suspicious person, the sampledimage data 24 are sent from the determiningportion 7 to thealarm device 9 as warningimage data 25. Thus, the image that is obtained from thewarning image data 25 is displayed on thedisplay portion 10 as a warning. At that point, the warning sound issues from thewarning device 9. - If it is determined that the user is a legitimate user, transmission of the
warning image data 25 from the determiningportion 7 to thealarm device 9 is not performed, nor is warning performed by thealarm device 9. - On the other hand, if the authentication result is "passed" (i.e., if the authentication returns that use of the elevator is permitted), then disabling of call registration by operation of the landing buttons is released by control from the
elevator control board 1. In that case, call registration can be performed by operating the landing buttons, and a car that responds to the call registration is moved to the lobby floor (the floor on which theauthenticating apparatus 2 is disposed). Here, processing of theimage data 23 is not performed by thesampling portion 6, and output of the sampledimage data 24 from thesampling portion 6 remains stopped. - Next, processing actions of the determining
portion 7 will be explained.Figure 2 is a flowchart that shows actions of the determiningportion 7 fromFigure 1 . In the figure, when the determiningportion 7 receives sampledimage data 24 from the sampling portion 6 (S1), the searchingportion 8 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in therecording medium 5 as suspicious person image data (S2). - If the identifying image data are not present as suspicious person image data, the searching
portion 8 records the sampledimage data 24 in therecording medium 5 as suspicious person image data, and also records the date andtime information 22 from the authenticatingapparatus 2 in therecording medium 5 so as to be associated with the sampled image data 24 (S3). In that case, the determiningportion 7 determines that the user is not a suspicious person (S4). - On the other hand, if the identifying image data are present as suspicious person image data, the searching
portion 8 adds the date andtime information 22 from the authenticatingapparatus 2 to past date and time information that has been stored in therecording medium 5 so as to be associated with the identifying image data (S5). In that case, the determiningportion 7 determines that the user is a suspicious person (S6), and also outputs the sampledimage data 24 to thealarm device 9 as warning image data 25 (S7). Processing by the determiningportion 7 is performed in this manner. - In an elevator security system of this kind, because facial portion image data of a user are sampled as sampled
image data 24 by thesampling portion 6 only if the authentication result is "flailed", and sampledimage data 24 that have been sampled in the past are stored in therecording medium 5 as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampledimage data 24 from thesampling portion 6 are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved. - Because the
alarm device 9 has adisplay portion 10 that displays an image that is obtained from the warning image data 25 (the sampled image data) as a warning, the warning that indicates that the person is suspicious can be presented visually, facilitating identification of the suspicious person to whom the warning refers. - Moreover, in the above example, the
alarm device 9 is installed in the vicinity of the authenticatingapparatus 2, but thealarm device 9 may also be installed in a control room of the building. The warning from thealarm device 9 can thereby be transmitted to a controller who is stationed inside the control room, enabling elevator security to be improved further. -
Figure 3 is a block diagram that shows an elevator security system according toEmbodiment 2 of the present invention. In the figure, aprocessor 4 has arecording medium 5, asampling portion 6, and a determiningportion 31. Configuration of therecording medium 5 and thesampling portion 6 is similar to that of therecording medium 5 and thesampling portion 6 according toEmbodiment 1. The determiningportion 31 has a searchingportion 32 and acondition comparing portion 33. - In response to the determining
portion 7 receiving sampledimage data 24, the searchingportion 32 searches whether or not identifying image data (i.e., image data that can be recognized as identical to the sampled image data 24) are present as suspicious person image data in the stored information in therecording medium 5. As a result of the search, if identifying image data are not present as suspicious person image data in the stored information, the searchingportion 32 records the sampledimage data 24 as suspicious person image data in therecording medium 5, and also records the date andtime information 22 from the authenticatingapparatus 2 in therecording medium 5 so as to be associated with the sampledimage data 24. In addition, as a result of the search, if the identifying image data are present as suspicious person image data in the stored information, the searchingportion 32 adds the date andtime information 22 from the authenticatingapparatus 2 to past date and time information that has been associated with the identifying image data, and outputs the sampledimage data 24, the past date and time information that has been linked to the identifying image data, and the date andtime information 22 from the authenticatingapparatus 2 to thecondition comparing portion 33 as suspiciousperson candidate information 26. - The
condition comparing portion 33 determines whether or not the suspiciousperson candidate information 26 satisfies preset suspicious person qualifying conditions. - Specifically, the
condition comparing portion 33 obtains the count of past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (Count), and compares the obtained count of past date and time information (Count) and a set count value (a predetermined threshold value) (TH1) that has been preset. Thecondition comparing portion 33 also obtains the past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (the newest past date and time information item if more than one past date and time information item exists) and the date andtime information 22 from the authenticatingapparatus 2, and compares a time difference between the obtained past date and time information and the date andtime information 22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined threshold value) (TH2) that has been preset. The set time value can be set to one minute, for example. - The
condition comparing portion 33 determines that the user does not satisfy the suspicious person qualifying conditions only if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (1) and a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (3). Thecondition comparing portion 33 determines that the user satisfies the suspicious person qualifying conditions if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (2), or a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (4). -
- The determining
portion 31 determines that the user is a suspicious person only if thecondition comparing portion 33 has made a determination that the user satisfies the suspicious person qualifying conditions. The determiningportion 31 also outputs the sampledimage data 24 that is included in the suspiciousperson candidate information 26 to thealarm device 9 as warningimage data 25 only if it has been determined that the user is a suspicious person. The rest of the configuration is similar to that ofEmbodiment 1. - Next, operation will be explained. Because operation according to the present embodiment is similar to operation according to
Embodiment 1 except for processing actions of the determiningportion 31, only the processing actions of the determiningportion 31 will be explained. -
Figure 4 is a flowchart that shows actions of the determiningportion 31 fromFigure 3 . In the figure, when the determiningportion 31 receives sampledimage data 24 from the sampling portion 6 (S11), the searchingportion 32 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in therecording medium 5 as suspicious person image data (S12). - If the identifying image data are not present as suspicious person image data, the searching
portion 32 records the sampledimage data 24 in therecording medium 5 as suspicious person image data, and also records the date andtime information 22 from the authenticatingapparatus 2 in therecording medium 5 so as to be associated with the sampled image data 24 (S13). In that case, the determiningportion 31 determines that the user is not a suspicious person (S14). - On the other hand, if the identifying image data are present as suspicious person image data, the searching
portion 32 adds the date andtime information 22 from the authenticatingapparatus 2 to past date and time information that has been stored in stored in therecording medium 5 so as to be associated with the identifying image data (S15). In that case, suspiciousperson candidate information 26 is sent from the searchingportion 32 to thecondition comparing portion 33. - Next, the
condition comparing portion 33 determines whether or not the suspiciousperson candidate information 26 satisfies the suspicious person qualifying conditions (S16). If the suspicious person qualifying conditions are not satisfied, the determiningportion 31 determines that the user is not a suspicious person (S14). - If the suspicious person qualifying conditions are satisfied, the determining
portion 31 determines that the user is a suspicious person (S17), and also outputs the sampledimage data 24 to thealarm device 9 as warning image data 25 (S18). Processing by the determiningportion 31 is performed in this manner. - In an elevator security system of this kind, because the determining
portion 31 determines whether or not a user is a suspicious person by comparing a count of past date and time information that has been associated with the identifying image data and a predetermined threshold value, it is possible to designate as a suspicious person only a user for whom the authentication result has been "flailed" frequently. Consequently, legitimate users who have accidentally had an authentication result "failed" in the past can be excluded from being treated as suspicious persons, enabling erroneous determinations to be prevented. - Because the determining
portion 31 determines whether or not a user is a suspicious person by comparing a time difference between past date and time information that has been associated with the identifying image data and date andtime information 22 from the authenticatingapparatus 2 with a predetermined threshold value, it can be determined that a user is a suspicious person when an authentication result is repeatedly "failed" a number of times in a short time, enabling accuracy in determining whether or not someone is a suspicious person to be improved. - Moreover, the configuration may also be such that elevator running information is transmitted to the
display portion 10 from theelevator control board 1, and thedisplay portion 10 displays the elevator running information during normal operation, and display images that are obtained from the suspicious person image data instead of the elevator running information or together with the elevator running information when warningimage data 25 is input.
Claims (4)
- An elevator security system characterized in comprising:an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed;a security camera for photographing a user who performs the authorizing operation;a processor comprising:a recording medium in which stored information is stored that includes suspicious person image data for identifying a suspicious person;a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; anda determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and also that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; andan alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion that the user is a suspicious person.
- An elevator security system according to Claim 1, characterized in that:the authenticating apparatus generates date and time information that corresponds to a date and time that the authorizing operation was performed;the determining portion associates and records the date and time information and the sampled image data in the recording medium if presence of the identifying image data is negated, and adds the date and time information from the authenticating apparatus to past date and time information that has been associated with the identifying image data if the identifying image data are present in the stored information; andthe determination by the determining portion as to whether or not the user is a suspicious person is made by comparing:a count of the past date and time information that has been associated with the identifying image data; anda predetermined threshold value.
- An elevator security system according to Claim 1, characterized in that:the authenticating apparatus generates date and time information that corresponds to a date and time that the authorizing operation was performed;the determining portion associates and records the date and time information and the sampled image data in the recording medium if presence of the identifying image data is negated, and adds the date and time information from the authenticating apparatus to past date and time information that has been associated with the identifying image data if the identifying image data are present in the stored information; andthe determination by the determining portion as to whether or not the user is a suspicious person is made by comparing:a time difference between the date and time information that has been associated with the identifying image data and the date and time information from the authenticating apparatus; anda predetermined threshold value.
- An elevator security system according to any of Claims 1 through 3, characterized in that the alarm device has a display portion that displays an image that is obtained from the sampled image data as the warning.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2007/052210 WO2008096433A1 (en) | 2007-02-08 | 2007-02-08 | Elevator security system |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2116499A1 true EP2116499A1 (en) | 2009-11-11 |
EP2116499A4 EP2116499A4 (en) | 2013-08-28 |
EP2116499B1 EP2116499B1 (en) | 2014-08-20 |
Family
ID=39681352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07713926.9A Not-in-force EP2116499B1 (en) | 2007-02-08 | 2007-02-08 | Elevator security system |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP2116499B1 (en) |
JP (1) | JP5377982B2 (en) |
KR (1) | KR101079891B1 (en) |
CN (1) | CN101600640B (en) |
WO (1) | WO2008096433A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10241486B2 (en) | 2015-04-03 | 2019-03-26 | Otis Elevator Company | System and method for passenger conveyance control and security via recognized user operations |
US10479647B2 (en) | 2015-04-03 | 2019-11-19 | Otis Elevator Company | Depth sensor based sensing for special passenger conveyance loading conditions |
US10513416B2 (en) | 2015-04-03 | 2019-12-24 | Otis Elevator Company | Depth sensor based passenger sensing for passenger conveyance door control |
US10513415B2 (en) | 2015-04-03 | 2019-12-24 | Otis Elevator Company | Depth sensor based passenger sensing for passenger conveyance control |
US11232312B2 (en) | 2015-04-03 | 2022-01-25 | Otis Elevator Company | Traffic list generation for passenger conveyance |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101734527A (en) * | 2009-12-31 | 2010-06-16 | 上海杰远环保科技有限公司 | Face recognition elevator reservation system and implementation method thereof |
CN101901340A (en) * | 2010-08-04 | 2010-12-01 | 惠州市华阳多媒体电子有限公司 | Suspect tracking method and system |
CN104299629A (en) * | 2014-10-28 | 2015-01-21 | 上海皓业广播传媒有限公司 | Video-control audio playing device and control method |
CN105060050A (en) * | 2015-07-23 | 2015-11-18 | 孟凯涛 | Elevator running door opening dangerous case detection system |
CN105035888B (en) * | 2015-08-03 | 2016-08-17 | 江苏意迪驱动设备有限公司 | The Intelligent elevator that refusal dangerous person takes |
CN105601679B (en) * | 2016-01-13 | 2019-10-15 | 复旦大学 | A method for separating and recovering monosaccharide, organic acid and phenolic compound components from biomass hydrothermal liquefaction hydrolyzate |
WO2017140365A1 (en) * | 2016-02-18 | 2017-08-24 | Otis Elevator Company | Elevator access control system |
CN108109348A (en) * | 2017-12-11 | 2018-06-01 | 日立楼宇技术(广州)有限公司 | Hierarchical alarm method and device |
CN108171123A (en) * | 2017-12-11 | 2018-06-15 | 日立楼宇技术(广州)有限公司 | Dangerous user's identification and the method and apparatus of alarm |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003109129A (en) * | 2001-09-27 | 2003-04-11 | Toshiba Corp | Device, system and method for managing passage |
JP2005132549A (en) * | 2003-10-29 | 2005-05-26 | Toshiba Corp | Control device for elevator |
JP2006103854A (en) * | 2004-10-04 | 2006-04-20 | Toshiba Elevator Co Ltd | Security system of elevator |
JP2006109014A (en) * | 2004-10-04 | 2006-04-20 | Omron Corp | Suspicious person determining device |
JP2007022776A (en) * | 2005-07-20 | 2007-02-01 | Toshiba Elevator Co Ltd | Security system for elevator |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR940006489B1 (en) * | 1992-06-19 | 1994-07-21 | 금성산전 주식회사 | Elevator crime prevention apparatus and method |
JP4703880B2 (en) * | 2001-03-30 | 2011-06-15 | 綜合警備保障株式会社 | Access control system |
JP2006202204A (en) * | 2005-01-24 | 2006-08-03 | Adc Technology Kk | Entry and exit control system |
-
2007
- 2007-02-08 EP EP07713926.9A patent/EP2116499B1/en not_active Not-in-force
- 2007-02-08 KR KR1020097014796A patent/KR101079891B1/en active IP Right Grant
- 2007-02-08 CN CN200780051077XA patent/CN101600640B/en not_active Expired - Fee Related
- 2007-02-08 WO PCT/JP2007/052210 patent/WO2008096433A1/en active Application Filing
- 2007-02-08 JP JP2008556953A patent/JP5377982B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003109129A (en) * | 2001-09-27 | 2003-04-11 | Toshiba Corp | Device, system and method for managing passage |
JP2005132549A (en) * | 2003-10-29 | 2005-05-26 | Toshiba Corp | Control device for elevator |
JP2006103854A (en) * | 2004-10-04 | 2006-04-20 | Toshiba Elevator Co Ltd | Security system of elevator |
JP2006109014A (en) * | 2004-10-04 | 2006-04-20 | Omron Corp | Suspicious person determining device |
JP2007022776A (en) * | 2005-07-20 | 2007-02-01 | Toshiba Elevator Co Ltd | Security system for elevator |
Non-Patent Citations (1)
Title |
---|
See also references of WO2008096433A1 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10241486B2 (en) | 2015-04-03 | 2019-03-26 | Otis Elevator Company | System and method for passenger conveyance control and security via recognized user operations |
US10479647B2 (en) | 2015-04-03 | 2019-11-19 | Otis Elevator Company | Depth sensor based sensing for special passenger conveyance loading conditions |
US10513416B2 (en) | 2015-04-03 | 2019-12-24 | Otis Elevator Company | Depth sensor based passenger sensing for passenger conveyance door control |
US10513415B2 (en) | 2015-04-03 | 2019-12-24 | Otis Elevator Company | Depth sensor based passenger sensing for passenger conveyance control |
US11232312B2 (en) | 2015-04-03 | 2022-01-25 | Otis Elevator Company | Traffic list generation for passenger conveyance |
US11836995B2 (en) | 2015-04-03 | 2023-12-05 | Otis Elevator Company | Traffic list generation for passenger conveyance |
Also Published As
Publication number | Publication date |
---|---|
WO2008096433A1 (en) | 2008-08-14 |
EP2116499A4 (en) | 2013-08-28 |
KR20090100409A (en) | 2009-09-23 |
EP2116499B1 (en) | 2014-08-20 |
KR101079891B1 (en) | 2011-11-04 |
JPWO2008096433A1 (en) | 2010-05-20 |
CN101600640A (en) | 2009-12-09 |
CN101600640B (en) | 2013-05-29 |
JP5377982B2 (en) | 2013-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2116499A1 (en) | Elevator security system | |
US20240338967A1 (en) | Face authentication apparatus | |
JP2004315127A (en) | Elevator controller | |
CN110386515B (en) | Method for controlling elevator stop floor based on artificial intelligence and related equipment | |
JP5191658B2 (en) | Elevator control device | |
JP2008120549A (en) | Elevator call registration device | |
JP6483214B1 (en) | Elevator system and elevator lost child detection method | |
JP2021104903A (en) | Elevator control device | |
JP2008027286A (en) | Personal authentication system | |
KR101052646B1 (en) | Monitoring system of elevator | |
JP2022151883A (en) | Elevator system and portable terminal | |
JP2011068469A (en) | Elevator control device, monitoring system, searching revitalization program, in/out management system | |
JP6673613B2 (en) | Elevator system | |
JP2005272088A (en) | Door control device and method | |
WO2019106756A1 (en) | Device for sensing user of elevator | |
JP2019159574A (en) | Log-in support system | |
JP2005263363A (en) | Security system of elevator | |
JP7234678B2 (en) | Processing system and processing method | |
JP2001282975A (en) | Employee managing system | |
JP6583480B2 (en) | Gate device and elevator group management system | |
JP7099564B1 (en) | Elevator system | |
JP2008063050A (en) | Security system of elevator | |
JP7088345B1 (en) | Elevator system | |
JP2016113238A (en) | Elevator control device and control method thereof | |
CN115588252A (en) | Security system and security control device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090702 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20130730 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G08B 13/196 20060101ALI20130724BHEP Ipc: B66B 5/00 20060101AFI20130724BHEP Ipc: B66B 1/46 20060101ALI20130724BHEP |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20140321 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 683332 Country of ref document: AT Kind code of ref document: T Effective date: 20140915 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602007038201 Country of ref document: DE Effective date: 20141002 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 683332 Country of ref document: AT Kind code of ref document: T Effective date: 20140820 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: VDEP Effective date: 20140820 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20141222 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20141120 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20141121 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20141220 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602007038201 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150228 |
|
26N | No opposition filed |
Effective date: 20150521 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150208 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20150208 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150228 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150228 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20151030 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150208 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150208 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150302 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R084 Ref document number: 602007038201 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20070208 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140820 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20211230 Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602007038201 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230901 |