WO2007138811A1 - 不審行動検知装置および方法、プログラムおよび記録媒体 - Google Patents
不審行動検知装置および方法、プログラムおよび記録媒体 Download PDFInfo
- Publication number
- WO2007138811A1 WO2007138811A1 PCT/JP2007/058936 JP2007058936W WO2007138811A1 WO 2007138811 A1 WO2007138811 A1 WO 2007138811A1 JP 2007058936 W JP2007058936 W JP 2007058936W WO 2007138811 A1 WO2007138811 A1 WO 2007138811A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- action
- behavior
- authority
- unit
- Prior art date
Links
- 238000000034 method Methods 0.000 title description 30
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims abstract description 10
- 230000009471 action Effects 0.000 claims description 230
- 230000006399 behavior Effects 0.000 claims description 205
- 238000001514 detection method Methods 0.000 claims description 45
- 238000004458 analytical method Methods 0.000 claims description 43
- 230000010354 integration Effects 0.000 claims description 31
- 239000000284 extract Substances 0.000 claims description 4
- 230000037081 physical activity Effects 0.000 abstract 1
- 238000012544 monitoring process Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 15
- 230000008569 process Effects 0.000 description 14
- 230000000875 corresponding effect Effects 0.000 description 10
- 230000003287 optical effect Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 210000003462 vein Anatomy 0.000 description 9
- 230000004397 blinking Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000003542 behavioural effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
- G08B13/19615—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion wherein said pattern is defined by the user
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19652—Systems using zones in a single scene defined for different treatment, e.g. outer zone gives pre-alarm, inner zone gives alarm
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
Definitions
- the present invention relates to a monitoring technique, and more particularly to an apparatus and method for detecting suspicious behavior, abnormal behavior, and prohibited behavior from an authentication sensor and camera video.
- Non-Patent Document 2 A System for Video Surveillance and Monitoring tech. Report CMU-R TR-00-12, Roootics Institute, Carnegie” The technology disclosed in Mellon University, May, 2000.
- Object Video's VEW and other products are known.
- violations occur when a person or vehicle enters an area where entry is prohibited, or when a person or vehicle crosses a dividing line that must not be exceeded. It is possible to automatically detect prohibited actions and issue an alarm.
- RFID is known to be used in various forms as an authentication device.
- the authority to enter and leave the building network is authenticated by RFID, and the person or vehicle that is authenticated to have authority is gated. It is applied to entrance / exit management such as opening the door to allow entry.
- Patent Document 1 Japanese Patent Application Laid-Open No. 2004-127142
- a person who has the authority to enter a predetermined space is authenticated using an IC card or the like, and the legitimacy of the person entering the space is verified.
- a method for judging the gender is disclosed, according to this technology, it is possible to judge only the legitimacy of entering a certain person, and it is not possible to judge the legitimacy of the action in a certain person or a place with a vehicle. There was a problem.
- Patent Document 2 Japanese Patent Application Laid-Open No. 2005-110557 discloses a method for improving accuracy by combining video surveillance and a sensor such as RFID.
- Patent Document 2 According to the technique of Patent Document 2, it is possible to obtain detailed dynamic information such as people and things that cannot be grasped only by video information from a camera or the like.
- Patent Document 1 JP 2004-127142 A
- Patent Document 2 JP-A-2005-11057
- Non-Patent Document 2 A System for Video Surveillance and Monotonng tech.report CMU- RI-TR-00-12, Robotics Institute, Carnegie Mellon University, May, 2000.
- Non-Patent Document 2 With the technology disclosed in Non-Patent Document 2, even a person or vehicle with action authority issues a warning as a prohibited action or a violation action, just like a general person or vehicle. was there.
- Patent Document 2 uses only information about whether or not it has an RFID or GPS mobile terminal, and authenticates it according to the action authority of the monitoring target. Therefore, it is not possible to apply a detailed monitoring policy according to the action authority, On the other hand, there was a problem that an alarm was erroneously issued.
- the present invention improves the conventional problems as described above, and does not assume that all persons or vehicles to be monitored carry RFID or assume biometric authentication. Analyzes the behavior of persons and vehicles in detail, and automatically violates and prohibits behavior without issuing extra warnings as long as it is within the scope of action authority given to the person or vehicle to be monitored. It is an object of the present invention to provide a suspicious behavior detection device and method capable of detecting an alarm and issuing an alarm.
- the suspicious behavior detection device includes a signal generating means, a sensor that receives a signal from the signal generating means, and a suspicious behavior detecting device that detects suspicious behavior using image data captured by a camera. Because
- An image input unit that captures and outputs image data from the camera
- a moving object such as a person or a vehicle included in the image indicated by the image data from the image input unit is detected, whether the detected moving object is a person or a vehicle, the position is determined, and a movement locus is also extracted.
- An action analysis unit that outputs as mobile body action information,
- An authentication information input unit that obtains an ID number, a reception time, and a reception position indicated by the signal received by the sensor, and outputs it as authentication information based on the output of the sensor;
- Action authority information that stores the action authority information corresponding to the authentication information, obtains action authority information corresponding to the authentication information input from the authentication information input section, and outputs the action authority information added to the input authentication information;
- the action authority information is added to the mobile action information by associating the authentication information added with the action authority information input from the action authority authentication section with the mobile action information input from the action analysis section.
- An information integration unit that outputs
- a list of allowed and prohibited actions is provided according to the action authority, and the action authority added to the mobile action information input from the information integration unit is set in advance. Actions that generate and output warning information when it is detected that the behavior indicated by mobile behavior information is a violation or prohibited action by referring to the list. And An output unit that outputs a warning when warning information from the behavior determination unit is input.
- the behavior authority level for the mobile body behavior information is set as the lowest level. It ’s good to know.
- the behavior determination unit creates and associates temporary mobile body behavior information and sets the behavior authority level to the lowest level. As a recognition, as well.
- a suspicious behavior detection device detects suspicious behavior using signal generation means, a sensor that receives a signal from the signal generation means, and image data captured by a camera.
- a suspicious behavior detection device detects suspicious behavior using signal generation means, a sensor that receives a signal from the signal generation means, and image data captured by a camera.
- An image input unit that captures and outputs image data from the camera
- a moving object such as a person or a vehicle included in the image indicated by the image data from the image input unit is detected, whether the detected moving object is a person or a vehicle, the position is determined, and a movement locus is also extracted.
- An action analysis unit that outputs as mobile body action information,
- An authentication information input unit that obtains an ID number, a reception time, and a reception position indicated by the signal received by the sensor, and outputs it as authentication information based on the output of the sensor;
- Action authority information corresponding to the authentication information is stored, a template for uniforms and clothes is stored, and a partial image of the person is obtained by referring to the position of the person from the moving body action information from the action analysis unit.
- the clothes and clothes Using the information as recognition information, obtain the action authority information corresponding to the authentication information input from the authentication information input unit or the recognition information that is information about uniforms and clothes, and add it to the input authentication information and output it
- An action authority authentication unit to
- the action authority information is added to the mobile action information by associating the authentication information added with the action authority information input from the action authority authentication section with the mobile action information input from the action analysis section.
- An information integration unit that outputs
- the behavior authority added to the mobile behavior information input from the information integration unit is recognized by referring to the list, and the behavior behavior information indicated by the mobile behavior information is recognized in advance.
- An action determination unit that generates and outputs warning information when it detects that the action is a violation action or a prohibited action;
- An output unit that outputs a warning when warning information from the behavior determination unit is input.
- the action authority authenticating unit sets the action authority level for the mobile body action information as the lowest level when the mobile body action information is input that does not correspond to any authentication information. As you do.
- the behavior authority authentication unit creates and associates temporary mobile body behavior information and minimizes the behavior authority level. It may be set as a level.
- the list of permitted actions and prohibited actions in the action determination unit may be changed according to time.
- the behavior determination unit may apply the behavior authority added to one mobile behavior information to other mobile behavior information.
- a program according to the present invention causes a computer system to execute the processing performed by each of the above components, and the recording medium according to the present invention stores the program.
- the behavior analysis unit detects a person or vehicle, detects its position, extracts a movement trajectory, etc.
- the behavior authority authentication unit extracts the behavior authority information of the person or vehicle, and the behavior authority information The position where is detected is detected.
- the information integration unit compares the position where the action authority information is detected with the position of the person or vehicle calculated from the image, and obtains the action authority level of the person or vehicle detected from the image. If no action authority information is detected when a person or vehicle is detected in the video, the action authority level is set to the lowest level.
- the action determination unit refers to a list of permitted actions and prohibited actions according to the detected action authority of the person or vehicle, and generates alarm information when a violation action or a prohibited action is detected. . [0034] Therefore, for example, even when a person is detected in a prohibited area other than the related person, if the person is permitted to enter with reference to the action authority information, alarm information is not generated. Therefore, it is possible to reduce the number of times that false alarm information is generated and to perform efficient monitoring.
- FIG. 1 is a block diagram of a figure reading apparatus according to an embodiment of the present invention.
- FIG. 2 is a flowchart of a figure reading method according to an embodiment of the present invention.
- FIG. 3 is a block diagram of a figure reading apparatus according to an embodiment of the present invention.
- FIG. 4 is a diagram showing an example in which camera video is converted to coordinates on a map.
- FIG. 5 is a diagram showing an example of the position of moving body behavior information obtained from a camera image.
- FIG. 6 is a diagram showing an example of an estimated range of the position of authentication information obtained from an RFID sensor.
- FIG. 7 is a diagram showing an example in which the position of the moving body behavior information and the position of the authentication sensor at the time Ijt are indicated by coordinates on the map.
- FIG. 8 is a diagram showing an example in which the position of the mobile action information and the position of the authentication information at the time ljt + 1 are indicated by coordinates on the map.
- FIG. 9 A diagram showing an example of a camera image of a one-way airport passage.
- FIG. 10 is a diagram showing an example of a camera image obtained by photographing a platform of a station.
- FIG. 11 is a diagram showing an example of mobile object information, authentication information, and restricted areas detected at a station platform.
- FIG. 1 is a block diagram showing a configuration of an embodiment of a figure reading apparatus according to the present invention.
- the present embodiment includes an image input unit 11, a behavior analysis unit 12, and an authentication information input unit.
- action authority authentication unit 14 information integration unit 15, action determination unit 16, and output unit 17, each of which is shown in Fig. 2, image input processing 21, action analysis processing 22, authentication information
- An input process 23, an action authority authentication process 24, an information integration process 25, an action determination process 26, and an output process 27 are executed.
- the image input unit 11 can be easily created from a normal CCD camera and memory.
- the image input unit 11 captures image data indicating an image taken by the camera or the like and outputs the image data to the behavior analysis unit 12.
- the behavior analysis unit 12 detects a moving object (image) such as a person or a vehicle included in the image indicated by the image data input from the image input unit 11, and determines whether the detected moving object is a person or a vehicle. ⁇ Recognize, find its position, extract the movement trajectory, and output it to the broadcast integration unit 15 as moving body action information.
- the authentication information input unit 13 can be easily created from, for example, a normal RFID reader, memory, and control means (CPU).
- the sensor (not shown) reads the ID number of a person or vehicle and the time of reading. Is output to the action authority authentication unit 14 as authentication information.
- the action authority authentication unit 14 includes a storage unit that stores the action authority information corresponding to the authentication information, and obtains and inputs the action authority information corresponding to the authentication information input from the authentication information input unit 13. It is added to the authentication information and output to the information integration unit 15.
- the authentication information input unit 13 includes, for example, face authentication, fingerprint authentication, vein authentication, and iris recognition. It is also possible to use certificates, clothing authentication, optical ID tags, and GPS mobile phone authentication. When using face authentication, iris authentication, clothing authentication, or optical ID tag authentication, it can be easily created from a normal CCD camera, memory, and CPU. When using fingerprint authentication, it can be easily created from a normal fingerprint sensor, memory and CPU. When using vein authentication, it can be easily created from a normal vein sensor, memory and CPU.
- the authentication information input unit 13 may be a normal GPS and a GPS mobile terminal such as a GPS mobile phone.
- the information integration unit 15 associates the authentication information to which the behavior authority information input from the behavior authority authentication unit 14 is added with the mobile body behavior information input from the behavior analysis unit 12, and moves the mobile body behavior information.
- Action authority information is added to and output to the action determination unit 16.
- the action determination unit 16 includes a list of permitted actions and prohibited actions according to the action authority, and the action added to the mobile action information input from the information integration part 15 Recognize the violations and prohibited actions set in advance by referring to the above list, and generate alarm information when the behavior indicated by the mobile action information is detected as a violation or prohibited action. And output to the output unit 17.
- the output unit 17 When the warning information from the behavior determination unit 16 is input, the output unit 17 outputs a warning.
- the behavior analysis unit 12, the behavior authority authentication unit 14, the information integration unit 15, the behavior determination unit 16, and the output unit 17 can be easily configured on a normal computer or PDA terminal.
- a moving object is detected from the video, whether the detected moving object is a person, a vehicle, or the like, the position of the moving object is obtained, and the movement locus is extracted. Then, the mobile body action information is created by obtaining the time information.
- a moving object detection algorithm an algorithm for recognizing whether the detected moving object is a person or a vehicle, and the position of the moving object are obtained, and the movement locus
- the moving body action information is obtained, for example, as time series information including time information, a circumscribed rectangle of the moving body on the image, and a recognition result for recognizing a person, a vehicle, or the like.
- time series information including time information, a circumscribed rectangle of the moving body on the image, and a recognition result for recognizing a person, a vehicle, or the like.
- Time series information of the position coordinates of the center of the circumscribed rectangle on the image of the moving body and the midpoint of the lower side can be used as the movement locus, and information obtained by converting these points into coordinates on the map Can also be used as a moving trajectory.
- Mobile body behavior information can be acquired in real time, and time series information can be acquired by measuring N times per second. At this time, N can be a positive integer from 1 to 30, for example.
- authentication information input processing 23 performed in authentication information input unit 13, authentication information is created.
- the authentication information includes the read ID number, the read time, and the location information of the read location.
- the read RFID or optical ID ID number and the time when the ID number was read when using RFID or optical ID, the read RFID or optical ID ID number and the time when the ID number was read. Authentication information can be created.
- the position information may be, for example, coordinates on a map of an installation location of an RFID reader or an optical ID sensor.
- the coordinates on the image obtained in the image input process 21 performed by the image input unit 11 are converted into real-world coordinates. It can also be set as a value.
- the position coordinates on the map of each RFID reader are obtained, and the RFID radio waves are obtained. It is also possible to triangulate the intensity to determine the position coordinates on the RFID map and use this as position information.
- the coordinates on the image obtained by the image input processing 21 performed in the image input unit 11 are converted into the real world. It can also be a value converted into coordinates.
- RFID position information is collected in real time within the RFID detection range. It can also be obtained, or it can be measured N times per second to obtain and output position information as a time series. At this time, N can be a positive integer from 1 to 30, for example.
- a person to be authenticated is a person, and facial authentication, fingerprint authentication, vein authentication, or iris authentication is used
- the ID number of the authenticated person is referred to by referring to a list of biometric information stored in advance.
- Authentication time information can be created.
- the position information may be, for example, coordinates on a map of the installation location of a fingerprint authentication sensor, a vein authentication sensor, or an iris authentication sensor.
- the coordinates on the image obtained by the image input processing 21 performed in the image input unit 11 are converted into the real world. It can also be a value converted into coordinates.
- the face position is usually detected for face authentication.
- the coordinates on the face image detected in the face authentication process can be used as position information.
- the position of the face can be obtained in real time, or the face position information, its time, and the person ID number are obtained as time series by measuring N times per second. It can also be information. At this time, N can be a positive integer from 1 to 30, for example.
- FIG. 3 is a block diagram showing the configuration of the figure reading apparatus when a subject to be authenticated is a person and clothes authentication is used.
- the apparatus shown in FIG. 3 includes an image input unit 31, a behavior analysis unit 32, an authentication information input unit 2 unit 33, a behavior authority authentication unit 34, an information integration unit 35, a behavior determination unit 36, and an output unit 37. Be done
- each unit in the present embodiment is as follows.
- the action authority authentication unit 34 in this embodiment stores the uniform and clothing templates, and the position of the person based on the mobile body action information from the behavior analysis unit 32 is the same as the output unit 17.
- a partial image of a person is obtained by referring to the image and compared with a uniform or clothing stored in the template. If there is a uniform or clothing whose similarity is higher than a predetermined threshold, the uniform Information on clothes and clothes is used as recognition information, and action authority information corresponding to this recognition information is obtained and added to the input authentication information for output.
- Dmax is a predetermined positive constant.
- the position information and the time information can be given the same information as the moving body behavior information obtained by the behavior analysis unit 12 or the behavior analysis processing 22.
- a position of a person or a vehicle is referred to obtain a partial image thereof to detect a light ID, and read the ID number to create authentication information. it can.
- the position information and the time information can be given the same information as the moving body behavior information obtained in the behavior analysis processing 22 in the behavior analysis unit 12.
- action authority authentication process 24 in the action authority authenticating unit 14 for example, referring to a table-type database of predetermined ID numbers and corresponding action authority levels using the ID number of the authentication information as a key, A behavior authority level is added to authentication information.
- the information integration processing 25 in the information integration unit 15 of FIG. 1 it is confirmed that the time is almost the same, or the mobile behavior information determined to have the closest time is compared with the authentication information. Thus, which mobile body information corresponds to which authentication information, the action authority level is given to the mobile body action information.
- Patent Document 2 described above Can be used.
- FIG. 4 is a diagram showing an image obtained by converting a certain camera image into coordinates on a map.
- Each of the persons 41A to 43A carries an active RFID, and the sensors 41B to 41B receive signals from the active RFID carried by the persons 41A to 43A.
- FIG. 5 is a diagram showing estimated positions based on the moving body behavior information 41C to 43C obtained by the behavior analysis unit 12 or 32).
- the behavior analysis unit 12 or 32 obtains the moving body behavior information 41C to 43C from the camera video.
- the estimated positions based on the mobile body behavior information 41C to 43C are the positions shown in FIG.
- the authentication information input unit 13 or 33 outputs the authentication information according to signals from the sensors 41B to 41B. If coordinate information on the map of sensors 41B-44B is also given in advance, the radio field strength of the active RFID carried by each person 41A-43A shown in the measurement results of each sensor 41B-44B as authentication information is triangular. As shown in FIG. 6, the estimated position based on the authentication information 41D to 43D can be obtained by surveying, and the authentication information input unit 13 (or 33) includes information including the estimated position in addition to the information based on RFID. Output as authentication information.
- the information integration unit 15 compares the estimated position information, and can determine that the correspondence is established if the position of the mobile action information exists within the estimated range of each authentication information. It is. It is also possible to express the position of mobile action information and authentication information as a continuous probability such as a normal distribution centered on a certain coordinate point, and the value obtained by multiplying the position information of each other is maximized. It is also possible to determine that the pair is in a correspondence relationship.
- the authentication sensor is a face authentication sensor, optical ID sensor, or GPS mobile terminal, the correspondence between the moving body behavior information and the authentication information can be obtained by the same method.
- FIG. 7 is a diagram showing an image obtained by converting a certain camera image into coordinates on a map.
- Human body motion information of person 51 A obtained from camera image at time t Position information and sensor based on 51C
- the mobile body behavior information 51C is not yet authenticated.
- the action determination unit 16 sets the action authority level for the mobile action information regardless of the content of the action authority information. Is recognized as the lowest level. Conversely, if there is authentication information that does not correspond to any mobile body behavior information, it is possible to create temporary mobile body behavior information and associate it with the assumption that it exists in the blind spot of the camera. Is recognized as the lowest level.
- the behavior authority in the behavior determination unit 16 described above is used.
- the action authority level can be set similarly to the level recognition, and such a configuration may be adopted.
- Temporary moving body behavior information can be replaced with newly found moving body behavior information.
- the list of permitted actions and prohibited actions is referred to according to the action authority of the detected person or vehicle, and the violation action or the prohibited action is determined. Generate alarm information when detected.
- the monitoring system is configured to generate alarm information.
- the monitoring system is configured to generate alarm information.
- the case will be explained.
- a person 61A walking in the opposite direction is detected in a one-way corridor of an airport.
- This person 61A is authenticated with active RFID, for example, and refers to a list of actions permitted and prohibited from the person's action authority level, and freely travels even in a one-way corridor at the airport. If it is possible to know that it is good, it is possible to determine that it is not necessary to issue an alarm because the behavior of walking in the opposite direction in the one-way corridor is within the scope of action authority, and alarm information is generated do not do.
- Person 61A's behavioral authority cannot be authenticated, or free traffic on one-way corridor is not permitted with reference to the list of permitted and prohibited behaviors at a low level of behavioral authority If it is known, alarm information can be generated.
- the authentication method is not limited to active RFID. Face authentication, fingerprint authentication, vein authentication, iris authentication, etc., narrow detection range, RFID, optical ID, clothing authentication, etc.
- alarm information should be created if a general person enters the track. This will be described in the case of a monitoring system with various settings.
- FIG. 11 shows a state in which FIG. 10 is represented on the map, and it is determined that the person 71A is in the restricted entry area in the area where entry is permitted only on the home.
- This person 71A is authenticated by active RFID or uniform, for example, and is allowed to enter the track by referring to the list of permitted and prohibited actions based on the person's action authority level. If it is possible to know that this is done, it is possible to determine that it is not necessary to issue an alarm because entry into the track is within the scope of action authority, and no alarm information is generated. .
- the authentication method does not need to be active RFID or authentication by clothes.Face authentication or fingerprint authentication can be performed using vein authentication or iris authentication with a narrow detection range, RFID or optical ID, etc. .
- the definition of permitted actions and non-permitted actions can be changed dynamically.
- Example it is possible to prohibit the intrusion of a person having a specific action authority according to the time zone.
- the determination of the permitted action and the non-permitted action may be a composite determination for a plurality of moving objects. For example, anyone can be allowed to enter a specific area only when there is a supervisor wearing a specific uniform. In addition, for example, a maximum of M people can be allowed to enter for clothes wearers.
- M can be set freely by a positive integer from 1 to 10, for example.
- Alarm information can be generated when L) ⁇ A X N (0).
- A is a predetermined constant.
- an alarm corresponding to the level of the alarm information is output.
- the text “Intruder in restricted area” is displayed, the character is displayed in yellow, orange, red according to the level, and the size of the character according to the level You can also change it.
- information can be distributed to e-mail, a portable information terminal, and a mobile phone, and the number of persons to be distributed and the target person can be changed according to the level.
- an alarm can be distributed to other monitoring systems via a network, and the number of systems for distributing information and target systems can be changed according to the level. It is also possible to emit an alarm sound with a siren or a local speaker, and the volume of the alarm sound or the frequency can be changed according to the level.
- the image input unit 31, the behavior analysis unit 32, the authentication information input unit 33, the behavior authority authentication unit 34, the information integration unit 35, the behavior determination unit 36, and the output unit 37 input signals from CCD cameras and sensors.
- the present invention can also be constructed on a computer system, and the present invention includes a program for causing a computer system to execute the processing performed by each component described above, and a CD—ROM, floppy disk, DVD— Recording media such as ROM are also included.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008517807A JP4924607B2 (ja) | 2006-05-31 | 2007-04-25 | 不審行動検知装置および方法、プログラムおよび記録媒体 |
US12/302,925 US7973656B2 (en) | 2006-05-31 | 2007-04-25 | Suspicious activity detection apparatus and method, and program and recording medium |
ES07742371T ES2431667T3 (es) | 2006-05-31 | 2007-04-25 | Dispositivo y método para detectar una actividad sospechosa, programa y medio de grabación |
EP07742371.3A EP2037426B1 (en) | 2006-05-31 | 2007-04-25 | Device and method for detecting suspicious activity, program, and recording medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006-152582 | 2006-05-31 | ||
JP2006152582 | 2006-05-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007138811A1 true WO2007138811A1 (ja) | 2007-12-06 |
Family
ID=38778332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2007/058936 WO2007138811A1 (ja) | 2006-05-31 | 2007-04-25 | 不審行動検知装置および方法、プログラムおよび記録媒体 |
Country Status (6)
Country | Link |
---|---|
US (1) | US7973656B2 (ja) |
EP (1) | EP2037426B1 (ja) |
JP (1) | JP4924607B2 (ja) |
CN (1) | CN101496074A (ja) |
ES (1) | ES2431667T3 (ja) |
WO (1) | WO2007138811A1 (ja) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009113265A1 (ja) * | 2008-03-11 | 2009-09-17 | パナソニック株式会社 | タグセンサシステムおよびセンサ装置、ならびに、物体位置推定装置および物体位置推定方法 |
JP2010205191A (ja) * | 2009-03-06 | 2010-09-16 | Omron Corp | 安全管理装置 |
JP2012069023A (ja) * | 2010-09-27 | 2012-04-05 | Hitachi Ltd | 異常検知装置 |
JP2012174058A (ja) * | 2011-02-22 | 2012-09-10 | Nec Corp | 特定事象検出装置、システム、方法及びプログラム |
JP2012203616A (ja) * | 2011-03-25 | 2012-10-22 | Hitachi Kokusai Electric Inc | 警報システム |
JP2013012149A (ja) * | 2011-06-30 | 2013-01-17 | Secom Co Ltd | 警備システム |
JP2013025529A (ja) * | 2011-07-20 | 2013-02-04 | Secom Co Ltd | 警備システム |
JP2015095695A (ja) * | 2013-11-09 | 2015-05-18 | 富士通株式会社 | 情報処理装置、情報処理システム、プログラム及び情報処理方法 |
JP2017046023A (ja) * | 2015-08-24 | 2017-03-02 | 三菱電機株式会社 | 移動体追跡装置及び移動体追跡方法及び移動体追跡プログラム |
JP2017536587A (ja) * | 2014-08-08 | 2017-12-07 | ディジコン ソシエダーヂ アノニマ コントローレ エレトロニコ パラ メカニカ | 監視及び制御システムとアクセスと禁止区域への立ち入り法 |
JP2018137608A (ja) * | 2017-02-22 | 2018-08-30 | 株式会社日立国際八木ソリューションズ | 監視カメラシステム |
JP2019109760A (ja) * | 2017-12-19 | 2019-07-04 | セコム株式会社 | 画像監視装置 |
CN110418106A (zh) * | 2019-07-08 | 2019-11-05 | 中铁第一勘察设计院集团有限公司 | 基建设备运营状态移动式组合监测方法 |
WO2020116023A1 (ja) * | 2018-12-05 | 2020-06-11 | ソニー株式会社 | 情報処理装置、情報処理システム、および情報処理方法、並びにプログラム |
CN111564015A (zh) * | 2020-05-20 | 2020-08-21 | 中铁二院工程集团有限责任公司 | 一种轨道交通周界入侵的监测方法及装置 |
US11417189B2 (en) | 2018-03-29 | 2022-08-16 | Canon Kabushiki Kaisha | Information processing apparatus and method, storage medium, and monitoring system |
US20220341220A1 (en) * | 2019-09-25 | 2022-10-27 | Nec Corporation | Article management apparatus, article management system, article management method and recording medium |
US12079770B1 (en) * | 2014-12-23 | 2024-09-03 | Amazon Technologies, Inc. | Store tracking system |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9721167B2 (en) | 2008-07-21 | 2017-08-01 | Facefirst, Inc. | Biometric notification system |
US9141863B2 (en) | 2008-07-21 | 2015-09-22 | Facefirst, Llc | Managed biometric-based notification system and method |
US10043060B2 (en) | 2008-07-21 | 2018-08-07 | Facefirst, Inc. | Biometric notification system |
US9405968B2 (en) | 2008-07-21 | 2016-08-02 | Facefirst, Inc | Managed notification system |
US10929651B2 (en) | 2008-07-21 | 2021-02-23 | Facefirst, Inc. | Biometric notification system |
US10909400B2 (en) | 2008-07-21 | 2021-02-02 | Facefirst, Inc. | Managed notification system |
JP5473801B2 (ja) * | 2010-06-30 | 2014-04-16 | 株式会社日立製作所 | 監視装置 |
IL207176A0 (en) * | 2010-07-25 | 2011-04-28 | Verint Systems Ltd | System and method for video - assisted identification of mobile phone users |
CN103108151A (zh) * | 2011-11-09 | 2013-05-15 | 华为技术有限公司 | 视频监控的方法和系统 |
US20150042795A1 (en) * | 2012-02-29 | 2015-02-12 | Reshimo Ltd. | Tracking system for objects |
CN102663452B (zh) * | 2012-04-14 | 2013-11-06 | 中国人民解放军国防科学技术大学 | 基于视频分析的可疑行为检测方法 |
CN102968873B (zh) * | 2012-11-29 | 2015-01-07 | 深圳市捷顺科技实业股份有限公司 | 一种停车场预警系统 |
US9498885B2 (en) | 2013-02-27 | 2016-11-22 | Rockwell Automation Technologies, Inc. | Recognition-based industrial automation control with confidence-based decision support |
US9798302B2 (en) | 2013-02-27 | 2017-10-24 | Rockwell Automation Technologies, Inc. | Recognition-based industrial automation control with redundant system input support |
US9804576B2 (en) | 2013-02-27 | 2017-10-31 | Rockwell Automation Technologies, Inc. | Recognition-based industrial automation control with position and derivative decision reference |
US9393695B2 (en) * | 2013-02-27 | 2016-07-19 | Rockwell Automation Technologies, Inc. | Recognition-based industrial automation control with person and object discrimination |
US9515769B2 (en) | 2013-03-15 | 2016-12-06 | Src, Inc. | Methods and systems for exploiting sensors of opportunity |
BR112015026374B1 (pt) * | 2013-04-19 | 2022-04-12 | James Carey | Sistema de reconhecimento analítico |
US10202135B2 (en) * | 2013-05-17 | 2019-02-12 | International Electronic Machines Corp. | Operations monitoring in an area |
CN104217205B (zh) * | 2013-05-29 | 2018-05-18 | 华为技术有限公司 | 一种识别用户活动类型的方法及系统 |
CN103679848A (zh) * | 2013-12-13 | 2014-03-26 | 北京尚易德科技有限公司 | 不文明行车行为的监控方法及文明行车监督记录仪 |
US10878323B2 (en) | 2014-02-28 | 2020-12-29 | Tyco Fire & Security Gmbh | Rules engine combined with message routing |
US10268485B2 (en) | 2014-02-28 | 2019-04-23 | Tyco Fire & Security Gmbh | Constrained device and supporting operating system |
US9541631B2 (en) | 2014-02-28 | 2017-01-10 | Tyco Fire & Security Gmbh | Wireless sensor network |
US9342884B2 (en) * | 2014-05-28 | 2016-05-17 | Cox Enterprises, Inc. | Systems and methods of monitoring waste |
WO2016123400A1 (en) * | 2015-01-28 | 2016-08-04 | Al-Amin Muhammad | Portable phone activated video camera with phone location tracking |
CN106507037A (zh) * | 2016-09-30 | 2017-03-15 | 北京中星微电子有限公司 | 人员入侵/越界的智能监控方法和系统 |
GB2562251A (en) * | 2017-05-09 | 2018-11-14 | Zircon Software Ltd | System and method for detecting unauthorised personnel |
JP2019148949A (ja) * | 2018-02-27 | 2019-09-05 | 株式会社 イマテック | 支援システム及び支援方法 |
CN109446998A (zh) * | 2018-10-31 | 2019-03-08 | 广州小鹏汽车科技有限公司 | 目标人物检测方法及系统 |
CN109495727B (zh) * | 2019-01-04 | 2021-12-24 | 京东方科技集团股份有限公司 | 智能监控方法及装置、系统、可读存储介质 |
CN113678178B (zh) * | 2019-03-29 | 2023-05-05 | 日本电气株式会社 | 监视系统、监视设备、监视方法和非暂时性计算机可读介质 |
US11501275B2 (en) * | 2019-04-05 | 2022-11-15 | Toshiba Global Commerce Solutions Holdings Corporation | Point of sale optical-based device association and configuration |
CN110718067A (zh) * | 2019-09-23 | 2020-01-21 | 浙江大华技术股份有限公司 | 违规行为告警方法及相关装置 |
CN110930624A (zh) * | 2019-12-06 | 2020-03-27 | 深圳北斗国芯科技有限公司 | 一种基于北斗的安全生产监控系统 |
CN112052719A (zh) * | 2020-07-16 | 2020-12-08 | 国网浙江省电力有限公司 | 基于图像特征识别的人员行为分析方法及系统 |
US11039075B1 (en) * | 2020-11-11 | 2021-06-15 | University Of Tabuk | Method and system for controlling devices for tracking synchronous movements |
CN115546824B (zh) * | 2022-04-18 | 2023-11-28 | 荣耀终端有限公司 | 禁忌图片识别方法、设备及存储介质 |
CN115394026A (zh) * | 2022-07-15 | 2022-11-25 | 安徽电信规划设计有限责任公司 | 一种基于5g技术的智能监控方法及系统 |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09330415A (ja) * | 1996-06-10 | 1997-12-22 | Hitachi Ltd | 画像監視方法および画像監視システム |
JP2000501253A (ja) * | 1995-11-06 | 2000-02-02 | アイディー.システムズ,インコーポレイテッド | 電子制御システム/ネットワーク |
JP2003132469A (ja) * | 2001-10-19 | 2003-05-09 | Sumitomo Heavy Ind Ltd | 認証管理システム及び認証管理プログラム |
JP2004005511A (ja) * | 2002-03-26 | 2004-01-08 | Toshiba Corp | 監視システム、監視方法および監視プログラム |
JP2004110690A (ja) * | 2002-09-20 | 2004-04-08 | Fuji Xerox Co Ltd | 機密文書管理システム、機密文書持ち出し管理装置、機密文書持ち出し管理方法 |
JP2004127142A (ja) | 2002-10-07 | 2004-04-22 | Hitachi Ltd | 認証方法及びシステム並びにそれを利用した入退場管理方法及びシステム |
JP2004178258A (ja) * | 2002-11-27 | 2004-06-24 | Mitsubishi Heavy Ind Ltd | 港湾セキュリティシステム |
JP2004240839A (ja) * | 2003-02-07 | 2004-08-26 | Matsushita Electric Ind Co Ltd | 集合住宅セキュリティシステム |
JP2005011057A (ja) | 2003-06-19 | 2005-01-13 | Mitsubishi Electric Corp | 空間情報配信装置 |
JP2005135230A (ja) * | 2003-10-31 | 2005-05-26 | Casio Comput Co Ltd | 屋内管理システムおよびプログラム |
JP2005292942A (ja) * | 2004-03-31 | 2005-10-20 | Secom Co Ltd | セキュリティシステム |
JP2005316945A (ja) * | 2004-03-31 | 2005-11-10 | Japan Research Institute Ltd | セキュリティシステムおよびセキュリティ保護方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07134767A (ja) | 1993-11-10 | 1995-05-23 | Toshiba Corp | 不審者侵入監視装置 |
JPH08163652A (ja) | 1994-11-30 | 1996-06-21 | Mitsubishi Electric Corp | 侵入監視システム |
ATE274733T1 (de) | 1999-06-04 | 2004-09-15 | Philipp Schmelter | Verfahren und vorrichtung zum kontrollieren des betretens oder verlassens eines bereichs durch personen oder bewegliche sachen |
US7123126B2 (en) | 2002-03-26 | 2006-10-17 | Kabushiki Kaisha Toshiba | Method of and computer program product for monitoring person's movements |
JP4198413B2 (ja) | 2002-08-05 | 2008-12-17 | 大日本印刷株式会社 | 入退場管理システムおよび方法 |
-
2007
- 2007-04-25 WO PCT/JP2007/058936 patent/WO2007138811A1/ja active Search and Examination
- 2007-04-25 US US12/302,925 patent/US7973656B2/en active Active
- 2007-04-25 CN CNA2007800278354A patent/CN101496074A/zh active Pending
- 2007-04-25 EP EP07742371.3A patent/EP2037426B1/en active Active
- 2007-04-25 ES ES07742371T patent/ES2431667T3/es active Active
- 2007-04-25 JP JP2008517807A patent/JP4924607B2/ja active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000501253A (ja) * | 1995-11-06 | 2000-02-02 | アイディー.システムズ,インコーポレイテッド | 電子制御システム/ネットワーク |
JPH09330415A (ja) * | 1996-06-10 | 1997-12-22 | Hitachi Ltd | 画像監視方法および画像監視システム |
JP2003132469A (ja) * | 2001-10-19 | 2003-05-09 | Sumitomo Heavy Ind Ltd | 認証管理システム及び認証管理プログラム |
JP2004005511A (ja) * | 2002-03-26 | 2004-01-08 | Toshiba Corp | 監視システム、監視方法および監視プログラム |
JP2004110690A (ja) * | 2002-09-20 | 2004-04-08 | Fuji Xerox Co Ltd | 機密文書管理システム、機密文書持ち出し管理装置、機密文書持ち出し管理方法 |
JP2004127142A (ja) | 2002-10-07 | 2004-04-22 | Hitachi Ltd | 認証方法及びシステム並びにそれを利用した入退場管理方法及びシステム |
JP2004178258A (ja) * | 2002-11-27 | 2004-06-24 | Mitsubishi Heavy Ind Ltd | 港湾セキュリティシステム |
JP2004240839A (ja) * | 2003-02-07 | 2004-08-26 | Matsushita Electric Ind Co Ltd | 集合住宅セキュリティシステム |
JP2005011057A (ja) | 2003-06-19 | 2005-01-13 | Mitsubishi Electric Corp | 空間情報配信装置 |
JP2005135230A (ja) * | 2003-10-31 | 2005-05-26 | Casio Comput Co Ltd | 屋内管理システムおよびプログラム |
JP2005292942A (ja) * | 2004-03-31 | 2005-10-20 | Secom Co Ltd | セキュリティシステム |
JP2005316945A (ja) * | 2004-03-31 | 2005-11-10 | Japan Research Institute Ltd | セキュリティシステムおよびセキュリティ保護方法 |
Non-Patent Citations (2)
Title |
---|
"A System for Video Surveillance and Monitoring", TECH. REPORT CMU-RI-TR-00-12, May 2000 (2000-05-01) |
"A System for Video Surveillance and Monitoring", TECH. REPORT CMU-RI-TR-00-12, ROBOTICS INSTITUTE, May 2000 (2000-05-01) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8243136B2 (en) | 2008-03-11 | 2012-08-14 | Panasonic Corporation | Tag sensor system and sensor device, and object position estimating device and object position estimating method |
JP5385893B2 (ja) * | 2008-03-11 | 2014-01-08 | パナソニック株式会社 | 位置特定システムおよびセンサ装置 |
WO2009113265A1 (ja) * | 2008-03-11 | 2009-09-17 | パナソニック株式会社 | タグセンサシステムおよびセンサ装置、ならびに、物体位置推定装置および物体位置推定方法 |
JP2010205191A (ja) * | 2009-03-06 | 2010-09-16 | Omron Corp | 安全管理装置 |
JP2012069023A (ja) * | 2010-09-27 | 2012-04-05 | Hitachi Ltd | 異常検知装置 |
JP2012174058A (ja) * | 2011-02-22 | 2012-09-10 | Nec Corp | 特定事象検出装置、システム、方法及びプログラム |
JP2012203616A (ja) * | 2011-03-25 | 2012-10-22 | Hitachi Kokusai Electric Inc | 警報システム |
JP2013012149A (ja) * | 2011-06-30 | 2013-01-17 | Secom Co Ltd | 警備システム |
JP2013025529A (ja) * | 2011-07-20 | 2013-02-04 | Secom Co Ltd | 警備システム |
JP2015095695A (ja) * | 2013-11-09 | 2015-05-18 | 富士通株式会社 | 情報処理装置、情報処理システム、プログラム及び情報処理方法 |
JP2017536587A (ja) * | 2014-08-08 | 2017-12-07 | ディジコン ソシエダーヂ アノニマ コントローレ エレトロニコ パラ メカニカ | 監視及び制御システムとアクセスと禁止区域への立ち入り法 |
US12079770B1 (en) * | 2014-12-23 | 2024-09-03 | Amazon Technologies, Inc. | Store tracking system |
JP2017046023A (ja) * | 2015-08-24 | 2017-03-02 | 三菱電機株式会社 | 移動体追跡装置及び移動体追跡方法及び移動体追跡プログラム |
JP2018137608A (ja) * | 2017-02-22 | 2018-08-30 | 株式会社日立国際八木ソリューションズ | 監視カメラシステム |
JP2019109760A (ja) * | 2017-12-19 | 2019-07-04 | セコム株式会社 | 画像監視装置 |
US11417189B2 (en) | 2018-03-29 | 2022-08-16 | Canon Kabushiki Kaisha | Information processing apparatus and method, storage medium, and monitoring system |
WO2020116023A1 (ja) * | 2018-12-05 | 2020-06-11 | ソニー株式会社 | 情報処理装置、情報処理システム、および情報処理方法、並びにプログラム |
CN110418106A (zh) * | 2019-07-08 | 2019-11-05 | 中铁第一勘察设计院集团有限公司 | 基建设备运营状态移动式组合监测方法 |
US20220341220A1 (en) * | 2019-09-25 | 2022-10-27 | Nec Corporation | Article management apparatus, article management system, article management method and recording medium |
CN111564015A (zh) * | 2020-05-20 | 2020-08-21 | 中铁二院工程集团有限责任公司 | 一种轨道交通周界入侵的监测方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
EP2037426B1 (en) | 2013-07-31 |
ES2431667T3 (es) | 2013-11-27 |
JPWO2007138811A1 (ja) | 2009-10-01 |
EP2037426A1 (en) | 2009-03-18 |
US20090243844A1 (en) | 2009-10-01 |
JP4924607B2 (ja) | 2012-04-25 |
CN101496074A (zh) | 2009-07-29 |
EP2037426A4 (en) | 2010-07-07 |
US7973656B2 (en) | 2011-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4924607B2 (ja) | 不審行動検知装置および方法、プログラムおよび記録媒体 | |
US11842613B2 (en) | System and methods for smart intrusion detection using wireless signals and artificial intelligence | |
JP4627743B2 (ja) | 入退出管理システム、並びに入退出管理装置 | |
US10552687B2 (en) | Visual monitoring of queues using auxillary devices | |
US20110001812A1 (en) | Context-Aware Alarm System | |
US20120076356A1 (en) | Anomaly detection apparatus | |
WO2010103584A1 (ja) | 入退検出装置、監視装置及び入退検出方法 | |
JP2019508801A (ja) | なりすまし防止顔認識のための生体検知 | |
US20050068165A1 (en) | System and method of providing security for a site | |
EP2779132A2 (en) | System and method of anomaly detection with categorical attributes | |
US20070035622A1 (en) | Method and apparatus for video surveillance | |
CN110674761B (zh) | 一种区域行为预警方法及系统 | |
US12039820B2 (en) | Multiple-factor recognition and validation for security systems | |
US8786699B2 (en) | Suspicious person detection device, suspicious person detection method and suspicious person detection program | |
US8873804B2 (en) | Traffic monitoring device | |
KR20160074208A (ko) | 비콘신호를 이용한 안전 서비스 제공 시스템 및 방법 | |
CN105094080A (zh) | 访问控制系统中的动态主体跟踪和多标记的系统和方法 | |
EP3968294B1 (en) | Apparatus, system, method and program | |
Tay et al. | Application of computer vision in the construction industry | |
WO2023124451A1 (zh) | 用于生成告警事件的方法、装置、设备和存储介质 | |
CN106297162A (zh) | 使用楼层地图的控制系统中的智能事件分析的系统和方法 | |
Sankar et al. | Intelligent Door Assist system using Chatbot and Facial Recognition | |
Edward et al. | Smart surveillance system using emotion detection | |
Bhattacharya et al. | Smart home security system using emotion detection | |
Balasubramanian et al. | Next-Gen Parking Facilities: Deep Learning for Face and License Plate based Access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780027835.4 Country of ref document: CN |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07742371 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008517807 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12302925 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007742371 Country of ref document: EP |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) |