WO2018198376A1 - Système et procédé de sécurité intelligents numériques, et programme - Google Patents
Système et procédé de sécurité intelligents numériques, et programme Download PDFInfo
- Publication number
- WO2018198376A1 WO2018198376A1 PCT/JP2017/017096 JP2017017096W WO2018198376A1 WO 2018198376 A1 WO2018198376 A1 WO 2018198376A1 JP 2017017096 W JP2017017096 W JP 2017017096W WO 2018198376 A1 WO2018198376 A1 WO 2018198376A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tag
- customer
- face
- suspicious person
- product
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 claims abstract description 111
- 238000000034 method Methods 0.000 claims abstract description 27
- 230000005856 abnormality Effects 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 13
- 230000001815 facial effect Effects 0.000 abstract 2
- 239000000047 product Substances 0.000 description 109
- 238000012806 monitoring device Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 14
- 238000012545 processing Methods 0.000 description 8
- 230000004044 response Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 230000007717 exclusion Effects 0.000 description 6
- 238000003384 imaging method Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 5
- 230000002265 prevention Effects 0.000 description 4
- 238000009434 installation Methods 0.000 description 3
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000006227 byproduct Substances 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000010970 precious metal Substances 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/04—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using a single signalling line, e.g. in a closed loop
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Definitions
- the present invention relates to a digital smart security system, method, and program for performing crime prevention by photographing a store with a surveillance camera.
- Patent Document 1 states that “the presence or absence of a mismatch is determined based on a product existing in a store and a product confirmed to be sold by the POS server, and when it is determined that there is a mismatch, The face information of the store clerk photographed by the store closing camera before the start-up of this time is recorded in the face information recording unit, and the suspicious person is specified.
- Patent Document 3 states that “the face information acquired by the face detection unit from the image captured by the camera in the vicinity of the timing at which the gate detects the tag is captured before the timing by the monitoring camera. In other words, an image including a face that is determined to be the same as the face represented by the face information is searched.
- Patent Document 4 states that “It is activated by an artificial external command after closing a store, and a shoplifter's visual verification screen is automatically generated. The video taken during business hours is read from the customer review site video file unit 510. Originally, the customer video that settled the price of the product and the video of the shoplifter are included, but the video related to the product that was cashed out at this point is deleted and only the video equivalent to the shoplifting site video is displayed. Has been.
- shoplifting is prevented by attaching a tag to a product in a store such as a convenience store.
- shoplifting cannot be prevented if the tag is removed from the product or the tag is wrapped in an electromagnetic shield sheet.
- An object of the present invention is to provide a digital smart security system, method, and program capable of preventing shoplifting even when a tag is removed from a product or the tag is invalidated.
- the digital smart security system includes a customer movement detecting means for detecting a customer moving with a tag-attached product, and the tag-attached product stops moving for a predetermined time except at a predetermined location. And tag abnormality determination means for determining that the tag is undetectable, and when the tag abnormality determination means determines that the tag has stopped moving or cannot be detected, an image of the face of the customer taken by the surveillance camera And a suspicious person registration means for registering as a suspicious person's face.
- the face authentication means for photographing the face of the customer by the monitoring camera, and authenticating whether or not the photographed customer's face matches the suspicious person's face registered in the suspicious person registration means, By providing a control means for reporting when the face authentication means recognizes the match, it is possible to immediately determine the suspicious person by performing face recognition after registration.
- control means transmits information including an image of the suspicious person's face to a portable terminal device carried by the employee closest to the suspicious person, so that the clerk closest to the position of the suspicious person (employee) Can be rushed to the scene in real time.
- the digital smart security method of the present invention includes a step of detecting customer movement for detecting a customer who moves together with a tagged product, and the movement of the tagged product is stopped for a predetermined time at a location other than a predetermined location. And a tag abnormality determination step for determining that the tag is undetectable, and a face of the customer photographed by the monitoring camera when the tag abnormality determination step determines that the tag is stopped or undetectable. And a suspicious person registration step of registering the image as a suspicious person's face.
- the present invention provides a customer movement detecting means for detecting a customer who moves with a product with a tag, and stopping the movement of the computer with the tag for a predetermined time at a location other than a predetermined location;
- Tag abnormality determining means for determining that the tag cannot be detected, and when the tag abnormality determining means determines that the tag is stopped or undetectable, an image of the face of the customer taken by the monitoring camera is displayed.
- a program for causing a digital smart security system to function as a suspicious person registration means for registering as a suspicious person's face.
- FIG. 1 is a block diagram showing a configuration of a digital smart security system according to an embodiment of the present invention.
- This system can be used in department stores, supermarkets, convenience stores, shopping malls, airports, airplanes, stations, trains, ships, restaurants, underground malls, specialty stores, precious metal stores, luxury boutiques, complex facilities, offices, theaters, gathering venues, It can be applied to schools, hospitals, factories, financial institutions, government offices, hotels, museums, art galleries, stadiums, event venues, new product announcement venues, and skyscrapers.
- the digital smart security system 1000 includes a plurality of surveillance cameras 11 installed on the ceiling of a product sales floor and an RFID (Radio Frequency) IDentification) reader 20 installed on a product shelf of the product sales floor.
- An authentication tag 21 carried by a store clerk (employee) and authenticated by the RFID reader 20, a Wi-Fi (Wireless Fidelity) terminal (hereinafter referred to as Wi-Fi master) 30 installed in a business facility, an i-beacon ( iBeacon) (registered trademark) base unit 40, a portable terminal device 50 carried by a store clerk (employee), a monitoring device 100 for controlling the entire system, a POS (Point Of Sale) server 200, and a POS A cash register 300 and an EOS (Electronic Ordering System) 400 are provided.
- Wi-Fi Wireless Fidelity
- the digital smart security system 1000 monitors the video from the surveillance camera 11 installed on the product sales floor, notifies the mobile terminal device 50 carried by the store clerk (employee) of the suspicious person, and stores the clerk (employee). ) Is a system that prevents shoplifting by suspicious individuals.
- Surveillance cameras 11 are installed at various places on the product sales floor such as in a store and take pictures of a person's face. An image captured by the monitoring camera 11 is output to the monitoring device 100.
- the surveillance camera 11 may shoot a moving image at all times, or may shoot a still image every certain time (for example, several seconds).
- a plurality of surveillance cameras 11 are installed in a store or the like, and a predetermined surveillance area can be photographed. In addition, there is one that causes a specific person to be tracked by the monitoring camera 11. Even if the surveillance camera does not track a specific person, a plurality of surveillance cameras 11 are installed, so that a person or the like can be photographed from various angles.
- RFID readers 20 are installed at predetermined intervals on the display shelf of the store. The RFID reader 20 detects that the product attached with the RF tag has left the display shelf depending on whether or not there is a response to transmission to the RF tag attached to the product.
- the RFID reader 20 installed in the POS cash register 300 detects whether there is a response to the transmission to the RF tag attached to the product, thereby managing the settlement of the product with the RF tag attached.
- the RFID reader 20 is an RFID tag compatible handy terminal or reader / writer.
- the communicable distance with the RFID tag is, for example, 3 to 7 m.
- the specification which makes a communicable distance about 400 m is also possible by using the active tag which incorporates a battery.
- the RFID reader 20 can also be installed in a shopping cart.
- the I / F unit 180 is connected wirelessly. The position of the RFID reader 20 installed in the shopping cart is detected and tracked by the monitoring device 100.
- the RF tag is removed or invalidated from an article that can be properly taken out of the store by purchasing it.
- the RFID reader 20 authenticates the authentication tag 21 possessed by the store clerk (employee).
- the RFID reader 20 captures the position of the store clerk (employee) carrying the authentication tag 21 by authenticating the authentication tag 21 possessed by the store clerk (employee).
- the Wi-Fi master device 30 exchanges information with the Wi-Fi slave device 51 of the mobile terminal device 50 using Wi-Fi.
- the Wi-Fi master device 30 can acquire position information acquisition by Wi-Fi positioning, that is, position information acquisition using a Wi-Fi access point and a predetermined position information service.
- iBeacon is a wireless technology that uses Bluetooth Low Energy.
- An i-beacon is a combination of an i-beacon parent device 40 that is a beacon device on the transmission side and an application (corresponding to an i-beacon child device 52 described later) of the mobile terminal device 50 that supports radio wave reception from the i-beacon parent device 40. Composed.
- the i-beacon transmits unique ID information necessary for identification, and reacts only to an application associated with the ID information of the mobile terminal device 50.
- the application of the portable terminal device 50 registers the same identifier as that of the i-beacon parent device 40.
- the POS server 200 collects and analyzes information on the best-selling products based on sales information at the time of sale of the POS system.
- the POS server 200 records and holds information on the time of sale (sales time) of the product registered by the POS register 20 as POS data.
- the POS server 200 varies depending on the corresponding POS system and model, etc., but records and manages functions (sales management function) of product sales performance information (sales information), records and manages merchandise inventory information (stock information), etc.
- Function inventory management function
- attribute management function the function of inputting and recording the purchaser's attribute information (gender, age group, etc.) by the store clerk.
- the POS cash register 300 is a cash register device having a function corresponding to the POS server 200.
- the POS register 300 includes a handy scanner and an input device (not shown).
- the handy scanner reads a product code attached to a product, that is, a bar code, and transmits it to the POS register 300.
- key input data is input from this input device.
- the key input data is data by key button input.
- a plurality of key input data are input according to the sales of a plurality of products.
- the portable terminal device 50 is carried by each of a plurality of shop assistants (employees) in the store.
- the mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, or a notebook computer 50c.
- the mobile terminal device 50 includes a mobile phone, PHS (Personal Handy-Phone System), PDA (Personal Digital Assistants) or dedicated terminals.
- the mobile terminal device 50 can be used by each store clerk (employee) at various places (that is, the current position), and includes a mail or a video from the monitoring device 100 via a telephone line (not shown). Video and the like can be received.
- the mobile terminal device 50 is assumed to be used by the smartphone 50a and the tablet 50b, and each individual can use the device at various locations (that is, the current location).
- One of the portable terminal devices 50 is arranged at a headquarter or a head office (not shown).
- the GPS 53 receives a radio wave of position information from a GPS satellite or the like.
- the GPS 53 calculates the current position information from the information received via the GPS antenna as three parameters of latitude, longitude, and altitude, and acquires the position information.
- the acquired position information is transmitted to the monitoring device 100 in a timely manner.
- the monitoring device 100 is installed, for example, in a store management room, and centrally manages the product sales floor in the store.
- the monitoring device 100 may be a general server computer or a personal computer.
- the monitoring apparatus 100 includes a control unit 110 (control means), an input unit 120, a storage unit 130, a display unit 140, an output unit 150, a face information database (DB) 153, an image processing unit 170, and an interface.
- a control unit 110 control means
- an input unit 120 input unit 120
- a storage unit 130 storage unit 130
- a display unit 140 output unit 150
- DB face information database
- an image processing unit 170 image processing unit 170
- an interface an interface.
- An (I / F) unit 180 and a communication unit 190 are provided, and each unit is connected by a bus 195.
- the monitoring device 100 monitors whether a suspicious person who performs shoplifting acts appears in a store.
- the monitoring device 100 When it is detected that the suspicious person has appeared in the store, the monitoring device 100 notifies the headquarters, the head office, or the security company system of the person information and the store information through the network.
- control section 110 reads each program from the ROM as necessary, loads it into the RAM, and executes each function (described later).
- Each program may be stored in the storage unit 130 in advance, or may be taken into the monitoring apparatus 100 when necessary via another storage medium or communication medium.
- the control unit 110 is configured by a CPU (Central Processing Unit) or the like, and controls the entire monitoring apparatus 100 and executes a control program to function as a digital smart security system. The detailed configuration of the control unit 110 will be described later.
- a CPU Central Processing Unit
- the input unit 120 is an input device for the user of the monitoring apparatus 100 to input instructions and the like, such as a keyboard, a mouse, a touch panel provided on the screen of the display unit 140, and a microphone.
- the storage unit 130 stores still images or moving images received from the monitoring camera 11, various data and programs used by the control unit 110, and the like.
- the display unit 140 displays an operation status of the monitoring apparatus 100, an image received from the monitoring camera 11, a GUI (Graphical User Interface) for operating the monitoring apparatus 100, and the like.
- GUI Graphic User Interface
- the output unit 150 is an audio interface, for example, and outputs an audio signal from the monitoring device 100 to the acoustic system 158 in the store.
- an audio signal output from the monitoring apparatus 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120 or music data stored in the storage unit 130 is controlled. 110 may be a reproduced audio signal.
- the acoustic system 158 includes an amplifier and a plurality of speakers arranged in the store, and broadcasts an audio signal input from the monitoring device 100 into the store.
- the face information DB 160 accumulates face images (face information) of suspicious persons and store personnel.
- Basic data such as a person's face registered in the face information DB 160 is obtained from the headquarters, head office, or security company (not shown) via the I / F unit 180, and the face information DB 160 is constructed.
- the face information DB can be updated to the latest face image (face information) by exchanging information with the headquarters, the head office or the security company (not shown).
- the I / F unit 180 connects each monitoring camera 11 and the monitoring device 100 arranged in the product sales floor. In addition, the I / F unit 180 connects each RFID reader 20 arranged in the product sales floor, and monitors the result of authentication of the authentication tag 21 possessed by a store clerk (employee) close to the RFID reader 20 To 100.
- the I / F unit 180 is connected to a headquarter, head office, security company, or the like (not shown) via a network or a dedicated line.
- the security company is not an essential component of the digital smart security system according to the present embodiment.
- the communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station.
- the communication part 190 receives the positional information on each portable terminal device 50 for every fixed period via a base station, and at the time of recognition of VIP, a Kramer, or a shoplifting addict, VIP, a Kramer, or a shoplifting addict Send information about emails (emails, videos including videos, etc.).
- FIG. 2 is a block diagram of the control unit 110 of the monitoring device 100 of the digital smart security system according to the embodiment of the present invention.
- the control unit 110 includes a tag movement determination unit 111 (customer movement detection unit), a customer position information acquisition unit 112 (customer movement detection unit), and a monitoring target setting unit 113 (customer movement detection unit).
- a monitoring target tracking unit 114 customer movement detection unit
- a suspicious person determination unit 115 tag abnormality determination unit, suspicious person registration unit
- a face authentication function unit 116 face authentication unit
- a position determination unit 117 A control unit
- a suspicious person tracking unit 118 control unit
- a transmission control unit 119 control unit.
- control unit 110 uses the monitoring camera 11 to move the product with the product and the customer's face image and the customer's scene image (still image or moving image). Is temporarily stored in the storage unit 130.
- the tag movement determination unit 111 determines whether or not the tag (RF tag) attached to the product has moved away from the display shelf.
- RFID readers 20 are installed on the display shelf at predetermined intervals. The RFID reader 20 detects that a product to which an RF tag is attached (hereinafter referred to as a product as appropriate) has left the display shelf depending on whether or not there is a response to transmission to an RF tag attached to the product. When the RFID reader 20 detects that the product has left the display shelf, the RFID reader 20 transmits detection information to the control unit 110 of the monitoring apparatus 100 after a predetermined time (for example, 10 seconds) has elapsed.
- a predetermined time for example, 10 seconds
- the tag movement determination unit 111 determines whether the product has started moving. The start of the movement of the product is detected by another adjacent RFID reader 20 when the product leaves the display shelf.
- the monitoring target setting unit 113 sets the monitoring target P by combining the product with the RF tag and the customer position information.
- the monitoring target P is a combination of customer position information and a plurality of RF tags. Further, the store clerk (employee) is excluded from the customer and does not form the monitoring target P.
- the monitoring target tracking unit 114 tracks the monitoring target P set by the monitoring target setting unit 113.
- the customer movement detection means to detect is comprised.
- the display shelf may be anything such as a display case or a product storage box as long as it displays or stores products.
- the suspicious person determination unit 115 does not perform the determination at the monitoring exclusion spot even if the monitoring target P is the location of the POS cash register 300.
- the face authentication function unit 116 performs face authentication by comparing a person's face image captured by the monitoring camera 11 with a suspicious person's face image registered in the face information DB 160.
- the face authentication function unit 116 performs face authentication to determine whether the face of a person included in the image received from the monitoring camera 11 is a suspicious person's face registered in the face information DB 160. Face authentication can be performed based on the similarity between the face information extracted from the received image and the suspicious person's face information registered in the face information DB 160.
- the position determination unit 117 determines the position of the mobile terminal device 50 closest to the suspicious person.
- the position determination unit 117 acquires the position information of the plurality of mobile terminal devices 50 in the product sales floor using the GPS position information and the RFID reader 20. Specifically, the position determination unit 117 obtains the position information of the store clerk (employee) on the product sales floor by authenticating the authentication tag carried by the store clerk (employee) by the plurality of RFID readers 20 installed on the product sales floor. get. In this case, the position determination unit 117 determines the position of the suspicious person against the installation position of the monitoring camera 11.
- the position determination unit 117 corresponds to the store clerk (employee) by authenticating each RFID reader 20 of the authentication tag 21 possessed by the store clerk (employee). It is determined that the RFID reader 20 is in proximity. Since the installation position of the RFID reader 20 is registered in advance, the position of the store clerk (employee) can be determined.
- the transmission control unit 119 transmits information related to the suspicious person (an image or a moving image of the suspicious person's scene) to a store clerk (employee) close to the position of the suspicious person. For example, the transmission control unit 119 transmits voice, video, and suspicious person location information (for example, information marked on the sales floor layout) by e-mail. The transmission control unit 119 determines the position of the mobile terminal device 50 closest to the suspicious person, and transmits information related to the suspicious person to the mobile terminal device 50.
- FIG. 3 is a flowchart showing the suspicious person's face registration process of the control unit 110 of the monitoring device 100 of the digital smart security system. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring apparatus 100.
- step S1 the tag movement determination unit 111 of the control unit 110 determines whether or not the tag (RF tag) attached to the product has started to move away from the display shelf.
- RFID readers 20 are installed on the display shelf at predetermined intervals. The RFID reader 20 detects that a product to which an RF tag is attached (hereinafter referred to as a product as appropriate) has left the display shelf depending on whether or not there is a response to transmission to an RF tag attached to the product. When the RFID reader 20 detects that the product has left the display shelf, the RFID reader 20 transmits detection information to the control unit 110 of the monitoring apparatus 100 after a predetermined time (for example, 10 seconds) has elapsed.
- a predetermined time for example, 10 seconds
- the tag movement determination unit 111 of the control unit 110 detects that the product has left the display shelf, the tag movement determination unit 111 determines whether the product has started to move. The start of the movement of the product is detected by another adjacent RFID reader 20 when the product leaves the display shelf.
- step S1: No If the tag has moved away from the display shelf but has not started moving (step S1: No), it is determined that the customer is picking up the product and the process of this flow is terminated.
- the customer location information acquisition unit 112 of the control unit 110 in step S2 obtains the location information of the customer moving with the product. get.
- the control unit 110 causes the surveillance camera 11 to move with the product and the customer's face image and the customer's scene image. (Still image or moving image) is temporarily stored in the storage unit 130 (see FIG. 1).
- the monitoring camera 11 is a PTZ camera, for example, and is remotely operated by the monitoring device 100.
- the surveillance camera 11 is an authentication camera that photographs a person's face. An image captured by the monitoring camera 11 is output to the monitoring device 100.
- step S4 the monitoring target setting unit 113 of the control unit 110 sets the monitoring target P by combining the product with the RF tag and the customer position information.
- a customer may pick up multiple items.
- the monitoring target P is a combination of customer location information and a plurality of RF tags. Further, the store clerk (employee) is excluded from the customer and does not form the monitoring target P.
- step S5 the monitoring target tracking unit 114 of the control unit 110 tracks the monitoring target P set by the monitoring target setting unit 113.
- step S6 the monitoring target tracking unit 114 determines whether or not the monitoring target P has moved to the POS cash register 300, and when the monitoring target P has moved to the POS cash register 300 (step S6: Yes) (the arrow in FIG. 1) a), it is determined that the customer is not a suspicious person, and the processing of this flow is terminated.
- step S6 When the monitoring target P has not moved to the POS register 300 (step S6: No) (see arrow b in FIG. 1), the process proceeds to step S7. If a customer (monitoring target P) having a tag attached to a product does not move to the POS register 300 for a long time, it is determined as a caution or abnormal state.
- the suspicious person determination unit 115 at step S8 When the monitoring target P is stopped at a place other than the cash register for a predetermined time or more (step S7: Yes), the suspicious person determination unit 115 at step S8, the place is a fitting room or a tasting corner where the eyes of the store clerk (employee) reach. It is determined whether the spot is a spot excluded from monitoring. Being a monitoring exclusion spot is not limited to the fact that the monitoring target P has moved to the monitoring exclusion spot, but is a condition that there is a store clerk (employee) at the monitoring exclusion spot.
- step S8 Yes
- the process returns to step S8.
- step S8 No
- the process proceeds to step S9.
- the suspicious person determination unit 115 determines whether or not the tag constituting the monitoring target P has become undetectable.
- a suspicious person removes a tag from a product or covers the tag with an electromagnetic shield sheet, radio waves responding to the tag that has been detected until now cannot be detected. If it is not the location of the POS register 300 but the response of the tag that has been detected so far stops, it is determined as a caution or abnormal state.
- step S9 If the RF tag forming the monitoring target P is not undetectable (step S9: No), the process returns to step S5 and the tracking of the monitoring target P is continued.
- step S9 Yes
- the process proceeds to step S10.
- step S ⁇ b> 10 the suspicious person determination unit 115 determines that the customer constituting the monitoring target P is suspected of being a suspicious person who performs shoplifting, product replacement, damage, and the like, and stores it in the storage unit 130.
- the customer's face image is read out and registered as a suspicious person's face, and this flow ends.
- the RF tag when the RF tag is removed, even if it is determined that the RF tag has stopped moving for a predetermined time or more and an attempt is made to register a face image, the customer has already left the place when the determination is made. Yes. Therefore, when the product tagged with the RF tag starts moving away from the display shelf in the above step S3, or when the movement is stopped for the predetermined time or longer, the image of the customer's face is stored. If it is determined in step S10 that the person is a suspicious person, the stored face image of the customer is registered as a suspicious person's face image. With this flow, the face image of the suspicious person is registered in the face information DB 160.
- step S22 the face authentication function unit 116 of the control unit 110 performs face authentication by comparing the face image of the person photographed by the monitoring camera 11 with the face image of the suspicious person registered in the face information DB 160.
- step S23 the face image of the person photographed by the monitoring camera 11 matches the face image of the suspicious person registered in the face information DB 160 (step S23: Yes), in step S24, the position determination unit 117 of the control unit 110 determines the position of the mobile terminal device 50 closest to the suspicious person.
- step S25 the suspicious person tracking unit 118 of the control unit 110 tracks the movement of the product sales floor of the suspicious person.
- step S ⁇ b> 26 the transmission control unit 119 of the control unit 110 transmits information about the suspicious person (an image of the suspicious person's scene or a moving image) to the clerk (employee) close to the position of the suspicious person, and ends this flow.
- the transmission control unit 119 transmits voice, video, and suspicious person location information (for example, information marked on the sales floor layout) by e-mail.
- information related to shoplifting addicts may be transmitted to the mobile terminal device 50 of the headquarters, the head office, or a security company in addition to the response to the store clerk (employee).
- FIG. 5 is a diagram for explaining an application example of the digital smart security system, and shows a store visitor and a sales floor layout (commodity sales floor).
- FIG. 5 shows a sales floor of a store such as a convenience store.
- the RFID reader 20 of FIG. 1 is the electronic tag reader of FIG. 5, and the electronic tag is an RF tag.
- the Wi-Fi slave device 51 of FIG. 1 is connected to the Wi-Fi master device 30 via the Wi-Fi repeater 51A installed for each fixed distance unit or sales department in FIG. For customers in the store, position information and customer face images are detected by an electronic tag, i-beacon, Wi-Fi, smartphone, surveillance camera 11, electronic tag gate terminal, and the like.
- the smartphone i.e., the application of the portable terminal device 50
- the smartphone receives the radio wave transmitted by the i-beacon parent device 40 installed in the upper part of the display case, and responds with the ID, whereby the i-beacon.
- the parent device acquires the location information of the smartphone.
- the Wi-Fi handset 51 of the smartphone (mobile terminal device 50) possessed by the customer is transferred to the Wi-Fi master 30 of the monitoring device 100 via the Wi-Fi repeater 51A installed in the store.
- the electronic tag of the product When the customer enters the shopping basket and moves the electronic tag product, the electronic tag of the product responds to the radio wave transmitted by the electronic tag reader 20, and the electronic tag reader 20 can receive the responded radio wave. .
- the problem is that the suspicious person has taken out the electronic tag from the display case (display shelf) for the purpose of shoplifting and has taken it away. This is because the electronic tag gate 12 cannot be detected. Therefore, a suspicious person will not be identified indefinitely.
- the digital smart security system 1000 detects that the product with the electronic tag is taken from the display case and moves with the customer, and the product with the electronic tag is located at a place other than the POS register 300. It is determined that the electronic tag has stopped for a predetermined time, or has disappeared because the electronic tag cannot be detected. When this determination is made, an image of the customer's face is taken by the surveillance camera 11 and registered as a suspicious person's face. Thus, the suspicious person's face can be registered at the time when the shoplifting action is being formed. Then, when the suspicious person visits the store again, face authentication can be performed and the mobile terminal device 50 of the clerk (employee) can be notified.
- the digital smart security system 1000 detects that a product has left the display shelf, whether or not the product has started moving.
- the tag movement determination unit 111 for determining whether or not, the customer position information acquisition unit 112 for acquiring the position information of the customer who moves with the product, and the product to which the RF tag is attached and the position information of the customer are combined to determine the monitoring target P
- the monitoring target tracking unit 114 that tracks the monitoring target P set by the monitoring target setting unit 113, and the monitoring target P are stopped at a place other than the POS register 300 for a predetermined time or more, Or when the tag which forms the monitoring object P becomes undetectable, the suspicious person determination unit 115 which registers the image of the customer's face as that of the suspicious person is provided.
- This configuration allows the customer's face image to be registered as a suspicious person even when the tag is removed from the product or the tag is invalidated.
- the clerk employee
- the clerk close to the position of the suspicious person Information on the suspicious person such as the suspicious person's face image is transmitted.
- a nearby store clerk employee can rush to the site in real time.
- the mobile terminal device When a customer carries a mobile terminal device, the mobile terminal device is installed by installing Wi-Fi equipment in the store, and the mobile terminal device carried by the customer makes a Wi-Fi connection. The customer can be identified. Similarly, since the mobile terminal device can be identified by the equipment of the i-beacon, the customer carrying the mobile terminal device can be identified. In this way, when a customer is identified by the mobile terminal device, the position of the mobile terminal device can be detected by the response of the radio wave from the mobile terminal device, so that the customer carrying the mobile terminal device The position can be detected. To this end, suspicious behavior of customers (e.g. (1) .repetitively reciprocating round trips in specific areas, (2) .pausing unnaturally long before a cashier or display case (3).
- suspicious behavior of customers e.g. (1) .repetitively reciprocating round trips in specific areas, (2) .pausing unnaturally long before a cashier or display case (3).
- the recording medium on which this program is recorded may be the ROM itself of the digital smart security system, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is inserted therein. It may be a readable CD-ROM or the like.
- the digital smart security system, method and program according to the present invention have a great effect when applied to a sales management system capable of effectively reducing shoplifting damage in a commercial facility. Installation in various stores is expected.
- DESCRIPTION OF SYMBOLS 11 Surveillance camera 12 Electronic tag gate 20 RFID reader 30 Wi-Fi parent machine 40 i beacon parent machine 50 Portable terminal device (terminal device) 51 Wi-Fi handset 51A Wi-Fi repeater 52 i-beacon handset 53 GPS 100 monitoring device 110 control unit 111 tag movement determination unit (customer movement detection means) 112 Customer location information acquisition unit (customer movement detection means) 113 Monitoring object setting unit (customer movement detection means) 114 Monitoring target tracking unit (customer movement detection means) 115 Suspicious person judging section (tag abnormality judging means, suspicious person registering means) 116 Face authentication function unit (face authentication means) 117 Position determination unit (control means) 118 Suspicious person tracking part (control means) 119 Transmission control unit (control means) 160 face information DB 200 POS server 250 Handy scanner 300 POS register 400 EOS 1000 Digital Smart Security System
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Electromagnetism (AREA)
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
L'invention concerne un système et un procédé de sécurité intelligents numériques ainsi qu'un programme permettant d'empêcher le vol à l'étalage même lorsque l'étiquette est retirée d'un produit ou que l'étiquette a été désactivée. L'invention concerne un système de sécurité intelligent numérique (1000) comprenant : une unité de détermination de mouvement d'étiquette (111) qui, lorsqu'il est détecté qu'un produit a été retiré d'une étagère de présentation, détermine si oui ou non ledit produit a commencé à se déplacer ; une unité de détermination de personne suspecte (115) qui, lorsqu'une cible de surveillance P s'est arrêtée pendant un temps prédéterminé ou plus longtemps à un emplacement autre qu'une caisse enregistreuse de point de vente (300) ou lorsqu'une étiquette composant la cible de surveillance P est devenue indétectable, enregistre une image du visage du client concerné comme celle d'une personne suspecte ; et une unité de fonction de reconnaissance faciale (116) qui effectue une reconnaissance faciale comparant l'image faciale d'une personne capturée par une caméra de surveillance (11) avec l'image faciale d'une personne suspecte enregistrée dans une base de données d'informations de visages (160).
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2017/017096 WO2018198376A1 (fr) | 2017-04-28 | 2017-04-28 | Système et procédé de sécurité intelligents numériques, et programme |
JP2017531916A JP6195331B1 (ja) | 2017-04-28 | 2017-04-28 | デジタルスマートセキュリティシステム、方法及びプログラム |
JP2017538255A JP6245626B1 (ja) | 2017-04-28 | 2017-05-26 | デジタルレジスタセキュリティシステム、方法及びプログラム |
PCT/JP2017/019801 WO2018198385A1 (fr) | 2017-04-28 | 2017-05-26 | Système, procédé et programme de sécurité de caisse enregistreuse numérique |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2017/017096 WO2018198376A1 (fr) | 2017-04-28 | 2017-04-28 | Système et procédé de sécurité intelligents numériques, et programme |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018198376A1 true WO2018198376A1 (fr) | 2018-11-01 |
Family
ID=59854919
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2017/017096 WO2018198376A1 (fr) | 2017-04-28 | 2017-04-28 | Système et procédé de sécurité intelligents numériques, et programme |
PCT/JP2017/019801 WO2018198385A1 (fr) | 2017-04-28 | 2017-05-26 | Système, procédé et programme de sécurité de caisse enregistreuse numérique |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2017/019801 WO2018198385A1 (fr) | 2017-04-28 | 2017-05-26 | Système, procédé et programme de sécurité de caisse enregistreuse numérique |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP6195331B1 (fr) |
WO (2) | WO2018198376A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111260869A (zh) * | 2020-01-19 | 2020-06-09 | 世纪龙信息网络有限责任公司 | 监控视频中视频帧的提取方法、装置和计算机设备 |
JP2020144738A (ja) * | 2019-03-08 | 2020-09-10 | 三菱電機株式会社 | 防犯装置、及び、防犯方法 |
CN116631133A (zh) * | 2023-07-21 | 2023-08-22 | 邹城市美安电子科技有限公司 | 一种基于行为识别的智能视频监控系统 |
WO2024195088A1 (fr) * | 2023-03-23 | 2024-09-26 | 日本電気株式会社 | Dispositif de notification, système de notification, procédé de notification, et support d'enregistrement |
US12106612B2 (en) | 2019-11-18 | 2024-10-01 | i-PRO Co., Ltd. | Investigation assistance system and investigation assistance method |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108289202A (zh) * | 2018-01-29 | 2018-07-17 | 北京大椽科技有限公司 | 一种智能网络监控方法及系统 |
JP7009021B2 (ja) * | 2018-10-11 | 2022-01-25 | 株式会社オプティム | 異常者予知システム、異常者予知方法、およびプログラム |
JP7197333B2 (ja) * | 2018-11-07 | 2022-12-27 | 東芝テック株式会社 | 情報提供装置及びその制御プログラム |
JP6990676B2 (ja) * | 2019-07-10 | 2022-01-12 | 株式会社ユーボ | 食品の注文受渡しシステム |
CA3165133A1 (fr) * | 2019-10-25 | 2021-04-29 | Sailesh Bharathwaaj Krishnamurthy | Suivi de positions en utilisant un systeme de suivi de position echelonnable |
JP7545801B2 (ja) * | 2019-12-11 | 2024-09-05 | キヤノンマーケティングジャパン株式会社 | 情報処理システム、情報処理システムの制御方法及びプログラム |
SG10201913955VA (en) * | 2019-12-31 | 2021-07-29 | Sensetime Int Pte Ltd | Image recognition method and apparatus, and computer-readable storage medium |
WO2021166810A1 (fr) * | 2020-02-19 | 2021-08-26 | ファナック株式会社 | Système d'affichage ayant une fonction de transition d'affichage d'élément |
JP7354461B2 (ja) * | 2020-09-15 | 2023-10-02 | 株式会社日立国際電気 | 監視システム及び監視方法 |
US20250118077A1 (en) * | 2022-02-22 | 2025-04-10 | Nec Corporation | Server apparatus, system, control method of server apparatus, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004171240A (ja) * | 2002-11-20 | 2004-06-17 | Casio Comput Co Ltd | 不正監視システムおよびプログラム |
JP2005135313A (ja) * | 2003-10-31 | 2005-05-26 | Hitachi Ltd | 商品管理システム |
JP2015032230A (ja) * | 2013-08-06 | 2015-02-16 | 株式会社日立製作所 | Rfidと監視カメラを用いた万引き防止システム |
JP2015176227A (ja) * | 2014-03-13 | 2015-10-05 | 富士通株式会社 | 監視方法、監視装置および監視プログラム |
JP5871296B1 (ja) * | 2015-08-19 | 2016-03-01 | 株式会社 テクノミライ | スマートセキュリティ・デジタルシステム、方法及びプログラム |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012242912A (ja) * | 2011-05-16 | 2012-12-10 | Ishida Co Ltd | 販売管理システム |
-
2017
- 2017-04-28 WO PCT/JP2017/017096 patent/WO2018198376A1/fr active Application Filing
- 2017-04-28 JP JP2017531916A patent/JP6195331B1/ja active Active
- 2017-05-26 WO PCT/JP2017/019801 patent/WO2018198385A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004171240A (ja) * | 2002-11-20 | 2004-06-17 | Casio Comput Co Ltd | 不正監視システムおよびプログラム |
JP2005135313A (ja) * | 2003-10-31 | 2005-05-26 | Hitachi Ltd | 商品管理システム |
JP2015032230A (ja) * | 2013-08-06 | 2015-02-16 | 株式会社日立製作所 | Rfidと監視カメラを用いた万引き防止システム |
JP2015176227A (ja) * | 2014-03-13 | 2015-10-05 | 富士通株式会社 | 監視方法、監視装置および監視プログラム |
JP5871296B1 (ja) * | 2015-08-19 | 2016-03-01 | 株式会社 テクノミライ | スマートセキュリティ・デジタルシステム、方法及びプログラム |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020144738A (ja) * | 2019-03-08 | 2020-09-10 | 三菱電機株式会社 | 防犯装置、及び、防犯方法 |
US12106612B2 (en) | 2019-11-18 | 2024-10-01 | i-PRO Co., Ltd. | Investigation assistance system and investigation assistance method |
CN111260869A (zh) * | 2020-01-19 | 2020-06-09 | 世纪龙信息网络有限责任公司 | 监控视频中视频帧的提取方法、装置和计算机设备 |
CN111260869B (zh) * | 2020-01-19 | 2022-06-10 | 天翼数字生活科技有限公司 | 监控视频中视频帧的提取方法、装置和计算机设备 |
WO2024195088A1 (fr) * | 2023-03-23 | 2024-09-26 | 日本電気株式会社 | Dispositif de notification, système de notification, procédé de notification, et support d'enregistrement |
CN116631133A (zh) * | 2023-07-21 | 2023-08-22 | 邹城市美安电子科技有限公司 | 一种基于行为识别的智能视频监控系统 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2018198376A1 (ja) | 2019-06-27 |
JP6195331B1 (ja) | 2017-09-13 |
WO2018198385A1 (fr) | 2018-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6195331B1 (ja) | デジタルスマートセキュリティシステム、方法及びプログラム | |
JP5871296B1 (ja) | スマートセキュリティ・デジタルシステム、方法及びプログラム | |
US7239241B2 (en) | Method and system for inventory control | |
US8477033B2 (en) | Inventory control | |
US8773266B2 (en) | RFID tag reader station with image capabilities | |
US11361642B2 (en) | Building system with sensor-based automated checkout system | |
WO2016103332A1 (fr) | Système, procédé et programme de sécurité numérique à localisation | |
JP4925419B2 (ja) | 情報収集システム、及び、モバイル端末 | |
JP5780569B1 (ja) | デジタルロス・デフェンスセキュリティシステム、方法及びプログラム | |
WO2015155847A1 (fr) | Système, procédé et programme numériques de défense contre les pertes/accidents | |
US20080246613A1 (en) | System and method for wireless security theft prevention | |
JP6245626B1 (ja) | デジタルレジスタセキュリティシステム、方法及びプログラム | |
EP4038593B1 (fr) | Validation d'étiquettes d'événements d'alarme d'identification par radiofréquence (rfid) | |
CN114616607B (zh) | 减少rfid出口门户中的假警报 | |
JP4865346B2 (ja) | 監視システム及び監視方法 | |
WO2018198250A1 (fr) | Système, procédé et programme de gains/sécurité intelligents numériques | |
WO2021186751A1 (fr) | Système, procédé, et programme de sécurité de fichage automatique numérique | |
JP4244221B2 (ja) | 監視映像配信方法及び監視映像配信装置並びに監視映像配信システム | |
JP2006352908A (ja) | 監視装置及び監視映像配信システム並びに監視映像配信方法 | |
CN114424262B (zh) | 使用图像数据的射频识别(rfid)标签位置验证 | |
WO2025109714A1 (fr) | Dispositif de traitement d'informations, procédé de traitement d'informations, support d'enregistrement et système de traitement d'informations | |
HK1226189A1 (zh) | 数字损失/事故防御系统、方法和程序 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2017531916 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17906895 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17906895 Country of ref document: EP Kind code of ref document: A1 |