KR20120137020A - Digital security system - Google Patents
Digital security system Download PDFInfo
- Publication number
- KR20120137020A KR20120137020A KR1020110056294A KR20110056294A KR20120137020A KR 20120137020 A KR20120137020 A KR 20120137020A KR 1020110056294 A KR1020110056294 A KR 1020110056294A KR 20110056294 A KR20110056294 A KR 20110056294A KR 20120137020 A KR20120137020 A KR 20120137020A
- Authority
- KR
- South Korea
- Prior art keywords
- security
- event
- area
- image data
- sensor
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S17/00—Systems using the reflection or reradiation of electromagnetic waves other than radio waves, e.g. lidar systems
- G01S17/66—Tracking systems using electromagnetic waves other than radio waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Electromagnetism (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Alarm Systems (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The digital security system according to the present invention can store and use the video data before and after the security event occurs or the reference time, and if the time of storage is not limited by the storage capacity of the storage medium. Even high quality video data can be stored.
Description
The present invention relates to a digital security system, and more particularly, when a security event due to external intrusion and irregular entry and exit occurs, the image data captured by the camera before and after the occurrence of the security event is stored in a security area that is not lost. The present invention relates to a digital security system that secures image data at the time when a security event occurs by storing.
In general, the security system includes a sensor, a control unit for determining whether a security event has occurred by receiving a detection value by the sensor, a camera for capturing a security target area, a storage medium for storing image data captured by the camera, and a control unit. It is composed of an alarm that is driven to warn of external intrusion, and a network device that notifies the security company of the external intrusion.
The cameras constituting the security system are configured to transmit image data to video tapes, volatile and nonvolatile memory, optical disks, and various other forms of storage media.
Since the image data picked up by the camera is usually driven for 24 hours, the amount of image data generated increases in proportion to the driving time. Even if you increase the capacity of the storage media embedded in the security system, you cannot afford the storage capacity of video data that increases over time. Usually, previously recorded video data is deleted according to the FIFO (First In First Out) method. In addition, a method of recording image data stored later on a storage medium is widely used. This will be described with reference to FIG. 1.
1 is a conceptual diagram illustrating a method of storing image data in a conventional security system.
Referring to FIG. 1, a conventional security system provides image data (still image, or moving image) captured by a
The conventional cyclic storage method according to the FIFO method is currently applied to the majority of security systems because the capacity of the limited storage medium can be utilized very effectively and appropriately. However, if a security event occurs once, it is possible to utilize the image data stored in the storage medium by a circular storage method, but when a plurality of security events occur sequentially, the image data stored in the
In addition, in order to cyclically store video data for a long period of time according to the FIFO method, the resolution of the video data must be lowered. On the side.
An object of the present invention is to solve the problem of loss of image data according to the conventional FIFO method by storing the image data before or after the security event occurs in the storage area that does not lose when a security event occurs, The present invention provides a digital security system that can be implemented.
The above object is to store the image data captured by the camera according to the present invention, and to receive a security event generated by any one of a memory partitioned into a security area and a storage area, a sensor installed for security, and a switch. When the security event occurrence is notified through an event receiver and the event receiver, image data scratched by the camera is stored in the security area, and a time earlier than the time when the security event occurs according to a preset reference time, and security It is achieved by the event control unit for storing in the security area from the image data of any one of the event occurrence time.
According to the present invention, image data associated with a time point at which a security event occurs is preserved, and high quality image data can be stored without limiting the time-depending time by the storage capacity of the storage medium.
1 is a conceptual diagram illustrating a method of storing image data in a conventional security system.
2 is a conceptual diagram of a digital security system according to an embodiment of the present invention.
FIG. 3 is a reference view of a security area and a storage area of the data storage unit shown in FIG. 2.
4 and 5 illustrate reference diagrams for a method of storing image data stored in a secure area.
The security event referred to in the present invention represents an event for any one of an external intrusion, object takeover, unauthorized entry attempt by unauthorized outsiders, irregular entry attempt during unauthorized time, and fire or gas leak. In addition, the security event may be additionally set by the security company that builds the security system, and the security event may be generated by the sensor and the switch.
The storage medium referred to in the present invention may be any one of a magnetic storage medium, an electronic storage medium, a volatile memory, a nonvolatile memory, an optical storage device, and a hologram storage device. However, it is not limited.
Hereinafter, the present invention will be described in detail with reference to the drawings.
2 is a conceptual diagram of a digital security system according to an embodiment of the present invention.
Referring to FIG. 2, the digital security system includes a
The
The
Here, the
The
The
The
Where the non-normal contact is,
The RF card in contact with the
The RF card is in contact with the
The
The
The
The
Here, the security area A refers to an area in which stored image data is not deleted irrespective of the FIFO method, and the storage area B is sequentially stored according to the FIFO method, and then the stored image data is deleted first. Thereafter, the area in which video data stored later is recorded. The secure area A may be divided into two zones A and B by the
Image data stored in the security area A may be deleted or moved to another storage device by a security company employee or a user using the system.
The
For example, when a security event aberration occurs within a unit time (for example, one day), the
In addition, when the security event occurs, the
Where the reference time is in seconds? It may be tens of minutes and corresponds to the image data before the security event occurs, and the image data at this time is stored in the storage area B. FIG. The
FIG. 3 is a reference view of a security area and a storage area of the data storage unit shown in FIG. 2.
Referring to FIG. 3, the security area A corresponds to an area for storing previous image data as a reference time around a time when a security event EVENT occurs or a time when the security event occurs. The security area A may be an area where the storage capacity is arbitrarily set or fixed by the
When the image data stored in the security area A stores the previous image data by the reference time around the security event occurrence time, the image data stored in the security area A is the reference time stored in the storage area B. After the previous image data is moved, the image data after the security event occurs may be sequentially stored sequentially.
4 and 5 illustrate reference diagrams for a method of storing image data stored in a secure area.
First, referring to FIG. 4, an example of storing image data in the security area A from the frame A3 at the time when the security event occurs is shown.
The frame A3 at the time when the security event EVENT occurs is generated by the
When the image frame at the time of the security event (EVENT) occurs is stored in the security area (A), it is stored in the security area (A) in order A3-> B1, A4-> B2, A3-> B3. Can be. In this case, the stored time may be a release point from the time when the security event (EVENT) occurs, and the release time point of the security event (EVENT) is when a security company employee accesses the digital security system according to the present invention, or It may be a time point at which the user randomly releases the security event.
Next, referring to FIG. 5, it can be seen that image data corresponding to the time point when the security event EVENT occurs and image data corresponding to the reference time Ta are stored. In FIG. 5, the image frames A1 and A2 do not mean a single frame. In FIG. 5, reference numerals A1 and A2 denote a frame set for a predetermined time (for example, several seconds to several minutes), and among the image frame sets, the frame sets A1 and A2 positioned within the reference time Ta are respectively. It may be stored in the security area A as B1, B2 (video frame set). In this case, since the frame sets A1 and A2 are image data before the security event EVENT occurs, they are stored in the storage area B. The
In this case, the frame sets A1 and A2 may be copied and stored in the security area A without being moved by the
110: camera 120: event receiver
130: event control unit 140: security device
150: data storage unit 160: sensor
170: switch 180: reader
Claims (9)
An event receiver configured to receive a security event generated by any one of a sensor and a switch installed for security; And
When the security event occurrence is notified through the event receiving unit, the image data scratched by the camera is stored in the security area, and a time earlier than when the security event occurs according to a preset reference time, and during the security event occurrence time. And an event controller configured to store the image data at any one point in the security area.
The security area,
And a fixed area within the data storage.
The security area,
And a part of a storage area of the data storage unit is allocated when the security event occurs.
The sensor,
Digital security system, characterized in that any one of the infrared sensor, chip-in sensor, human body sensor, ultrasonic sensor, and light sensor.
Wherein the switch comprises:
And a magnetic switch, and a touch switch.
The reader further includes a reader for reading an authenticated RF card.
The reader includes:
And when the unauthorized RF card is detected, notifying the event receiver of the detection result.
The event receiver,
And when the reader notifies of the detection of an irregular RF card, generates the security event and provides the event to the event controller.
And a security device driven by the event controller when the event controller stores the image data in the security area.
The security device,
Digital security system, characterized in that any one of the warning lights, alarms, door opening and closing device, and the device for notifying the security event to the server of the security company connected to the network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020110056294A KR20120137020A (en) | 2011-06-10 | 2011-06-10 | Digital security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020110056294A KR20120137020A (en) | 2011-06-10 | 2011-06-10 | Digital security system |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20120137020A true KR20120137020A (en) | 2012-12-20 |
Family
ID=47904283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020110056294A KR20120137020A (en) | 2011-06-10 | 2011-06-10 | Digital security system |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20120137020A (en) |
-
2011
- 2011-06-10 KR KR1020110056294A patent/KR20120137020A/en not_active Application Discontinuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6039658B2 (en) | Video-enabled electronic article surveillance detection system and method | |
CN104079881B (en) | The relative monitoring method of supervising device | |
US20070237358A1 (en) | Surveillance system with dynamic recording resolution and object tracking | |
EP3435347B1 (en) | Regional surveillance and alarming system and method | |
JPH0877468A (en) | Monitor device | |
WO2016150045A1 (en) | Housebreaking alarm method and device | |
ATE300071T1 (en) | BURGLARY DETECTION THROUGH TRAJECTORY ANALYSIS IN SUPERVISION AND MONITORING SYSTEMS | |
KR101381924B1 (en) | System and method for monitoring security using camera monitoring apparatus | |
US20240161601A1 (en) | Methods and apparatus for detecting false alarms | |
TWI447675B (en) | Device capable of protecting alarming siren and method for protecting alarming siren | |
US20060197666A1 (en) | Glassbreak noise detector and video positioning locator | |
CN104392578A (en) | Household fireproofing and guard against theft system with early warning function | |
KR20120113014A (en) | Image recognition apparatus and vison monitoring method thereof | |
US20120147182A1 (en) | Method to monitor an area | |
KR100297059B1 (en) | Motion Detector and Its Method using three demensional information of Stereo Vision | |
KR20120137020A (en) | Digital security system | |
KR20160016022A (en) | CCTV systems equipped with storage capabilities Events | |
KR101515566B1 (en) | Digital recording device of camera builtin type | |
KR101434641B1 (en) | Crossing gate | |
KR101393302B1 (en) | Cctv system with video image comparison unit | |
US9558650B2 (en) | Surveillance method, surveillance apparatus, and marking module | |
JP3124169U (en) | Alarm monitoring device | |
KR101250734B1 (en) | Shop surveillance system be connected with cash register | |
KR20030024114A (en) | Digital video recording method in a motion detection mode | |
US20220005333A1 (en) | Smart Security Monitoring Device and System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |