[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

KR20120137020A - Digital security system - Google Patents

Digital security system Download PDF

Info

Publication number
KR20120137020A
KR20120137020A KR1020110056294A KR20110056294A KR20120137020A KR 20120137020 A KR20120137020 A KR 20120137020A KR 1020110056294 A KR1020110056294 A KR 1020110056294A KR 20110056294 A KR20110056294 A KR 20110056294A KR 20120137020 A KR20120137020 A KR 20120137020A
Authority
KR
South Korea
Prior art keywords
security
event
area
image data
sensor
Prior art date
Application number
KR1020110056294A
Other languages
Korean (ko)
Inventor
김현수
Original Assignee
김현수
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김현수 filed Critical 김현수
Priority to KR1020110056294A priority Critical patent/KR20120137020A/en
Publication of KR20120137020A publication Critical patent/KR20120137020A/en

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S17/00Systems using the reflection or reradiation of electromagnetic waves other than radio waves, e.g. lidar systems
    • G01S17/66Tracking systems using electromagnetic waves other than radio waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The digital security system according to the present invention can store and use the video data before and after the security event occurs or the reference time, and if the time of storage is not limited by the storage capacity of the storage medium. Even high quality video data can be stored.

Description

Digital security system {Digital security system}

The present invention relates to a digital security system, and more particularly, when a security event due to external intrusion and irregular entry and exit occurs, the image data captured by the camera before and after the occurrence of the security event is stored in a security area that is not lost. The present invention relates to a digital security system that secures image data at the time when a security event occurs by storing.

In general, the security system includes a sensor, a control unit for determining whether a security event has occurred by receiving a detection value by the sensor, a camera for capturing a security target area, a storage medium for storing image data captured by the camera, and a control unit. It is composed of an alarm that is driven to warn of external intrusion, and a network device that notifies the security company of the external intrusion.

The cameras constituting the security system are configured to transmit image data to video tapes, volatile and nonvolatile memory, optical disks, and various other forms of storage media.

Since the image data picked up by the camera is usually driven for 24 hours, the amount of image data generated increases in proportion to the driving time. Even if you increase the capacity of the storage media embedded in the security system, you cannot afford the storage capacity of video data that increases over time. Usually, previously recorded video data is deleted according to the FIFO (First In First Out) method. In addition, a method of recording image data stored later on a storage medium is widely used. This will be described with reference to FIG. 1.

1 is a conceptual diagram illustrating a method of storing image data in a conventional security system.

Referring to FIG. 1, a conventional security system provides image data (still image, or moving image) captured by a camera 10 to a storage device 50, and the storage device 50 stores image data in a storage medium 51. Save sequentially. Since the image data generated by the camera 10 is continuously generated for 24 hours, the image data is A1? If the storage area of the storage medium 51 is included, the new image data (B1, B2) is deleted, and then the first stored image data (A1, A2) is deleted. The new image data B1 and B2 are recorded in the storage medium 51.

The conventional cyclic storage method according to the FIFO method is currently applied to the majority of security systems because the capacity of the limited storage medium can be utilized very effectively and appropriately. However, if a security event occurs once, it is possible to utilize the image data stored in the storage medium by a circular storage method, but when a plurality of security events occur sequentially, the image data stored in the storage medium 51 Some of them may be lost.

In addition, in order to cyclically store video data for a long period of time according to the FIFO method, the resolution of the video data must be lowered. On the side.

An object of the present invention is to solve the problem of loss of image data according to the conventional FIFO method by storing the image data before or after the security event occurs in the storage area that does not lose when a security event occurs, The present invention provides a digital security system that can be implemented.

The above object is to store the image data captured by the camera according to the present invention, and to receive a security event generated by any one of a memory partitioned into a security area and a storage area, a sensor installed for security, and a switch. When the security event occurrence is notified through an event receiver and the event receiver, image data scratched by the camera is stored in the security area, and a time earlier than the time when the security event occurs according to a preset reference time, and security It is achieved by the event control unit for storing in the security area from the image data of any one of the event occurrence time.

According to the present invention, image data associated with a time point at which a security event occurs is preserved, and high quality image data can be stored without limiting the time-depending time by the storage capacity of the storage medium.

1 is a conceptual diagram illustrating a method of storing image data in a conventional security system.
2 is a conceptual diagram of a digital security system according to an embodiment of the present invention.
FIG. 3 is a reference view of a security area and a storage area of the data storage unit shown in FIG. 2.
4 and 5 illustrate reference diagrams for a method of storing image data stored in a secure area.

The security event referred to in the present invention represents an event for any one of an external intrusion, object takeover, unauthorized entry attempt by unauthorized outsiders, irregular entry attempt during unauthorized time, and fire or gas leak. In addition, the security event may be additionally set by the security company that builds the security system, and the security event may be generated by the sensor and the switch.

The storage medium referred to in the present invention may be any one of a magnetic storage medium, an electronic storage medium, a volatile memory, a nonvolatile memory, an optical storage device, and a hologram storage device. However, it is not limited.

Hereinafter, the present invention will be described in detail with reference to the drawings.

2 is a conceptual diagram of a digital security system according to an embodiment of the present invention.

Referring to FIG. 2, the digital security system includes a camera 110, an event receiver 120, an event controller 130, a security device 140, a data storage unit 150, a sensor 160, and a switch 170. , And the reader 180 may be configured.

The camera 110 may be a stationary or rotating camera, and may be installed around an interior of a building, an exterior of a building, and other security items. The camera 110 may capture a still image or a moving image, generate image data, and provide the generated image data to the event controller 130.

The sensor 160 may be any one of an infrared sensor, an in-chip sensor, a human body sensor, an ultrasonic sensor, and an optical sensor, and may be installed in windows, doors, valuables, and various other places where security is required. When the sensor 160 is an optical sensor, the sensor 160 may be a sensor including a light emitting unit for projecting light and a light receiving unit for receiving light generated by the light emitting unit, and the light generated by the light emitting unit may be a light receiving unit. When not directed, a security event may occur. On the other hand, if the sensor 160 is an ultrasonic sensor, it can measure the distance to a specific location, the change occurs in the distance measured by the external intrusion, or the location of the structure (for example, furniture or valuables) located inside the building Security events can also be generated based on distance value changes that occur when changes occur.

Here, the sensor 160 may be connected to the event receiver 120 by wire or wirelessly.

The switch 170 may be any one of a magnetic switch, a touch switch, and a general contact type switch, and generates an electrical on-off signal as a security event.

The switch 170 is inexpensive and simple in structure, and may be used in the form of being turned on and off in the event of external intrusion and valuables position change. In the case of the magnetic switch, when installed in the door or window, the voltage is different when it is located at a short distance and at a long distance, so it can be used to detect an external intrusion, and in the case of a touch switch, the external switch is expected to be located. It can also be used.

The event receiver 120 may collect a security event generated by the sensor 160 or the switch 170. The event receiver 120 may receive a security event from the sensor 160 that is wired or wirelessly connected, or may receive a security event according to a voltage change of the switch 170. In addition, the event receiver 120 may be connected to the reader 180 to determine whether the RF card requesting access to the reader 180 is irregular.

Where the non-normal contact is,

The RF card in contact with the reader 180 is an unauthorized card, and

The RF card is in contact with the reader 180 in an unauthorized time zone.

The security device 140 may be one of a warning light, a warning light, a door opener, and a wired / wireless network device that notifies a security event to a security company.

The security device 140 generates a high decibel warning sound, voices an external intrusion, generates a strong light, or notifies a security event to a security company in case of an external intrusion or theft of an article (a valuable). You may also be notified of theft of the item for help. Accordingly, the security device 140 may be a type in which the warning light, the warning light, and the wired / wireless network device exist separately, or may be integrally formed.

The data storage unit 150 sequentially stores the image data picked up by the camera 110 in the order of the time taken.

The data storage unit 150 may store image data according to a first in first out (FIFO) method, and may be preferably divided into a security area A and a storage area B. FIG.

Here, the security area A refers to an area in which stored image data is not deleted irrespective of the FIFO method, and the storage area B is sequentially stored according to the FIFO method, and then the stored image data is deleted first. Thereafter, the area in which video data stored later is recorded. The secure area A may be divided into two zones A and B by the data storage 150 itself, or may be arbitrarily divided by the event controller 130.

Image data stored in the security area A may be deleted or moved to another storage device by a security company employee or a user using the system.

The event controller 130 stores the image data captured by the camera 110 in the security area A when the security event occurrence is notified through the event receiver 120. If the security event is not notified of the occurrence, the event controller 130 stores the image data in the storage area (B), the storage method is in accordance with the FIFO. The event controller 130 may increase or decrease the size of the security area A according to the frequency and duration of the security event.

For example, when a security event aberration occurs within a unit time (for example, one day), the event controller 130 increases the size of the security area A to secure a storage space of image data related to the security event, and stores the storage area B. ) Can be reduced in size.

In addition, when the security event occurs, the event controller 130 stores the image data of the camera 110 in the security area A from the time when the security event occurs, or compares the image data before the time when the security event occurs. It can be stored in the security area (A).

Where the reference time is in seconds? It may be tens of minutes and corresponds to the image data before the security event occurs, and the image data at this time is stored in the storage area B. FIG. The event controller 130 may move image data corresponding to the reference time within the reference time from the image data stored in the storage area B to the security area with reference to the reference time, and subsequently store the data after the security event has occurred. .

FIG. 3 is a reference view of a security area and a storage area of the data storage unit shown in FIG. 2.

Referring to FIG. 3, the security area A corresponds to an area for storing previous image data as a reference time around a time when a security event EVENT occurs or a time when the security event occurs. The security area A may be an area where the storage capacity is arbitrarily set or fixed by the event controller 130.

When the image data stored in the security area A stores the previous image data by the reference time around the security event occurrence time, the image data stored in the security area A is the reference time stored in the storage area B. After the previous image data is moved, the image data after the security event occurs may be sequentially stored sequentially.

4 and 5 illustrate reference diagrams for a method of storing image data stored in a secure area.

First, referring to FIG. 4, an example of storing image data in the security area A from the frame A3 at the time when the security event occurs is shown.

The frame A3 at the time when the security event EVENT occurs is generated by the camera 110, and may be an MPEG format, an H264 format, a YUV (4: 2: 2) format, a YUV (4: 2: 2) format, And frames according to various other formats.

When the image frame at the time of the security event (EVENT) occurs is stored in the security area (A), it is stored in the security area (A) in order A3-> B1, A4-> B2, A3-> B3. Can be. In this case, the stored time may be a release point from the time when the security event (EVENT) occurs, and the release time point of the security event (EVENT) is when a security company employee accesses the digital security system according to the present invention, or It may be a time point at which the user randomly releases the security event.

Next, referring to FIG. 5, it can be seen that image data corresponding to the time point when the security event EVENT occurs and image data corresponding to the reference time Ta are stored. In FIG. 5, the image frames A1 and A2 do not mean a single frame. In FIG. 5, reference numerals A1 and A2 denote a frame set for a predetermined time (for example, several seconds to several minutes), and among the image frame sets, the frame sets A1 and A2 positioned within the reference time Ta are respectively. It may be stored in the security area A as B1, B2 (video frame set). In this case, since the frame sets A1 and A2 are image data before the security event EVENT occurs, they are stored in the storage area B. The event controller 130 stores the frame sets A1 stored in the storage area B. , A2) may be moved to the security area A, and then image frames after the security event EVENT occurs may be arranged and stored after the frame sets A1 and A2.

In this case, the frame sets A1 and A2 may be copied and stored in the security area A without being moved by the event controller 130. If copied by the event controller 130, the same frame set A1 and A2 may exist in the security area A and the storage area B. FIG.

110: camera 120: event receiver
130: event control unit 140: security device
150: data storage unit 160: sensor
170: switch 180: reader

Claims (9)

A data storage unit which stores image data captured by the camera and is divided into a security area and a storage area;
An event receiver configured to receive a security event generated by any one of a sensor and a switch installed for security; And
When the security event occurrence is notified through the event receiving unit, the image data scratched by the camera is stored in the security area, and a time earlier than when the security event occurs according to a preset reference time, and during the security event occurrence time. And an event controller configured to store the image data at any one point in the security area.
The method of claim 1,
The security area,
And a fixed area within the data storage.
The method of claim 1,
The security area,
And a part of a storage area of the data storage unit is allocated when the security event occurs.
The method of claim 1,
The sensor,
Digital security system, characterized in that any one of the infrared sensor, chip-in sensor, human body sensor, ultrasonic sensor, and light sensor.
The method of claim 1,
Wherein the switch comprises:
And a magnetic switch, and a touch switch.
The method of claim 1,
The reader further includes a reader for reading an authenticated RF card.
The reader includes:
And when the unauthorized RF card is detected, notifying the event receiver of the detection result.
The method according to claim 6,
The event receiver,
And when the reader notifies of the detection of an irregular RF card, generates the security event and provides the event to the event controller.
The method of claim 1,
And a security device driven by the event controller when the event controller stores the image data in the security area.
9. The method of claim 8,
The security device,
Digital security system, characterized in that any one of the warning lights, alarms, door opening and closing device, and the device for notifying the security event to the server of the security company connected to the network.
KR1020110056294A 2011-06-10 2011-06-10 Digital security system KR20120137020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020110056294A KR20120137020A (en) 2011-06-10 2011-06-10 Digital security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020110056294A KR20120137020A (en) 2011-06-10 2011-06-10 Digital security system

Publications (1)

Publication Number Publication Date
KR20120137020A true KR20120137020A (en) 2012-12-20

Family

ID=47904283

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020110056294A KR20120137020A (en) 2011-06-10 2011-06-10 Digital security system

Country Status (1)

Country Link
KR (1) KR20120137020A (en)

Similar Documents

Publication Publication Date Title
JP6039658B2 (en) Video-enabled electronic article surveillance detection system and method
CN104079881B (en) The relative monitoring method of supervising device
US20070237358A1 (en) Surveillance system with dynamic recording resolution and object tracking
EP3435347B1 (en) Regional surveillance and alarming system and method
JPH0877468A (en) Monitor device
WO2016150045A1 (en) Housebreaking alarm method and device
ATE300071T1 (en) BURGLARY DETECTION THROUGH TRAJECTORY ANALYSIS IN SUPERVISION AND MONITORING SYSTEMS
KR101381924B1 (en) System and method for monitoring security using camera monitoring apparatus
US20240161601A1 (en) Methods and apparatus for detecting false alarms
TWI447675B (en) Device capable of protecting alarming siren and method for protecting alarming siren
US20060197666A1 (en) Glassbreak noise detector and video positioning locator
CN104392578A (en) Household fireproofing and guard against theft system with early warning function
KR20120113014A (en) Image recognition apparatus and vison monitoring method thereof
US20120147182A1 (en) Method to monitor an area
KR100297059B1 (en) Motion Detector and Its Method using three demensional information of Stereo Vision
KR20120137020A (en) Digital security system
KR20160016022A (en) CCTV systems equipped with storage capabilities Events
KR101515566B1 (en) Digital recording device of camera builtin type
KR101434641B1 (en) Crossing gate
KR101393302B1 (en) Cctv system with video image comparison unit
US9558650B2 (en) Surveillance method, surveillance apparatus, and marking module
JP3124169U (en) Alarm monitoring device
KR101250734B1 (en) Shop surveillance system be connected with cash register
KR20030024114A (en) Digital video recording method in a motion detection mode
US20220005333A1 (en) Smart Security Monitoring Device and System

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application