EP1603094A1 - Security system, terminal, information processing device and method, program, vehicle security system, network system, and setting method - Google Patents
Security system, terminal, information processing device and method, program, vehicle security system, network system, and setting method Download PDFInfo
- Publication number
- EP1603094A1 EP1603094A1 EP04717766A EP04717766A EP1603094A1 EP 1603094 A1 EP1603094 A1 EP 1603094A1 EP 04717766 A EP04717766 A EP 04717766A EP 04717766 A EP04717766 A EP 04717766A EP 1603094 A1 EP1603094 A1 EP 1603094A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- terminal device
- security
- processing
- localizer
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/181—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
- G08B13/187—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interference of a radiation field
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
- G08B15/02—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
Definitions
- the present invention relates to a security system, a terminal device, an information processing device and method, a program, a vehicle security system, a network system and a setting method, and more particularly relates to a security system, a terminal device, an information processing device and method, a program, a vehicle security system and a setting method which detect the unauthorized invasion of an object constituting the object of security.
- Japanese Patent Application Laid-Open No. 10-27292 a system is disclosed which is devised so that the final person to leave when a facility such as a shop or the like is closed can open a final exit door and return home only after doors that are the object of security are locked and a security mode is set.
- the system is devised so that during ordinary business hours up to five o'clock in the evening, the final exit door can be freely opened from the inside, while after five o'clock in the evening, the setting of the security mode is a condition for the opening of the door.
- the setting of the security mode that notifies the security firm of the breaking of the door will be forgotten is prevented in advance.
- a system which is devised so that a monitoring mode is successively varied in loop form by pressing one setting button of a home security device for a time that is less than a first specified time within a second specified time.
- the monitoring mode is checked after the second specified time has elapsed, and the crime-prevention sensors of a plurality of systems are set in a monitoring state.
- the monitoring state of the crime-prevention sensors of the plurality of systems is released by the operation of one setting button.
- the setting/release of the monitoring state of the closing of doors can be accomplished by the operation of a single setting button even in cases where the crime-prevention sensors of a plurality of systems are connected.
- a system in which a first sensor that has a detection area on the object of security and on the front surface side of a part above the object of security, and a second sensor that has a detection area on the object of security and on the front surface side of a part below the object of security, are provided, a logic circuit equipped with a timer is disposed on at least one of the sensors, i. e., the first sensor or second sensor, and an output path that outputs a detection signal from the detection part within the sensor to the outside is disposed on at least the other sensor.
- the logic circuit equipped with a timer generates a warning signal when a detection signal from the detection part within the sensor on which the timer-equipped logic circuit is disposed and a detection signal that is extracted via the output path of the other sensor are received within a specified time.
- a system which is devised so that when a window is opened so that the sensing signal of an indoor invasion sensor is input into a data processing part, a judgment is made as to whether or not a sensing signal indicating that an outdoor invasion sensor that monitors a specified position outside the window has sensed an intruder has been input into the data processing part in the past few seconds, and if conditions described previously are satisfied as a result of this judgment, an internal notification is made by means of a voice sounding action using an internal notification part and a speaker, and a higher system notification is made using a terminal that connects a higher system notification part and a telephone circuit, so that an actual warning is issued, while if the [abovementioned] conditions are not satisfied, this event is handled as an erroneous warning, and no internal notification or higher system notification is made.
- the warning can be judged to be an actual warning, and an intrusion warning can be issued, only when the [abovementioned
- At-home guard processing that judges whether or not an unauthorized intruder is present must be appropriately started and stopped.
- the intruder must be repulsed with an appropriate timing and at an appropriate place.
- a first object of the present invention is to lower the frequency of erroneous warnings by setting and releasing the warning mode automatically without requiring the operation of a button or the like.
- the present invention is devised so that specified processing with respect to unauthorized intrusions can be executed in accordance with the conditions inside the object of security without requiring any bothersome operation.
- a second object of the present invention is to allow the simple execution of area settings for the purpose of setting and releasing the warning mode, i. e., to allow simple initial settings.
- a third object of the present invention is to allow effective repulsion of intruders.
- a fourth object of the present invention is to make it possible to provide appropriate evacuation guidance to authorized members.
- the first security system of the present invention is characterized in that this security system comprises member position detection means that detect the positions of authorized members using the object of security, unauthorized intrusion position detection means that detect the positions of unauthorized intrusions into the object of security, execution means that are disposed in a plurality of locations inside the object of security, and that execute processing with respect to unauthorized intrusions, and execution control means that select the execution means that execute processing in accordance with the relationship between the positions of authorized members detected by the member position detection means and the positions of unauthorized intrusions detected by the unauthorized intrusion position detection means, and that control the execution of the processing of the selected execution means.
- the execution control means can be devised so that in cases where the distance between the position of an unauthorized intrusion and the position of an authorized member is equal to or less than a specified threshold value, one or more execution means including the execution means closest to the position of the unauthorized intrusion are selected, and the execution of processing is controlled so that the processing for the unauthorized intrusion is executed by the selected execution means.
- the execution control means can be devised so that the execution of processing is performed in such a manner that processing for the evacuation guidance of the authorized member is executed by execution means whose distance from the position of the authorized member is equal to or less than a specified threshold value, and which are located furthest from the position of the unauthorized intrusion.
- the execution means can be devised so that these execution means execute processing that generates white smoke.
- the member position detection means can be devised so that these member position detection means detect the positions of authorized members by detecting the positions of devices which are mounted on the authorized members, and which transmit by wireless transmission an ID code that corresponds to the object of security.
- the member position detection means can be devised so that these member position detection means detect the positions of authorized members by detecting the positions of devices which are mounted on the authorized members, which transmit by wireless transmission an ID code that corresponds to the object of security, and in which the execution means are disposed.
- the second security system of the present invention is characterized in that this security system comprises member position detection means that detect the positions of authorized members using the object of security, unauthorized intrusion position detection means that detect the positions of unauthorized intrusions into the object of security, external security surface memory means that store the position of an external security surface, internal security surface memory means that store the position of an internal security surface, execution control means that control the execution of first guard processing or second guard processing on the basis of the positions of authorized members detected by the member position detection means so that the first guard processing is executed in cases where no authorized member is present inside the external security surface, and so that the second guard processing is executed in cases where an authorized member is present inside the internal security surface, and execution means which are disposed in a plurality of locations inside the object of security, and which execute processing for unauthorized intrusions when the positions of unauthorized intrusions into the object of security are detected by the unauthorized intrusion position detection means in cases where the first guard processing or second guard processing is executed.
- the first guard processing can be set as caretaker guard processing that is guard processing for unauthorized intrusions into the inside of the external security surface
- the second guard processing can be set as at-home guard processing that is guard processing for unauthorized intrusions into the space between the external security surface and internal security surface.
- the execution means can be devised so that these execution means execute processing that generates white smoke.
- the member position detection means can be devised so that these means detect the positions of authorized members by detecting the positions of devices which are mount on the authorized members, and which transmit by wireless transmission ID codes that correspond to the object of security.
- the member position detection means can be devised so that these means detect the positions of authorized members by detecting the positions of devices which are mounted on the authorized members, which transmit by wireless transmission an ID code that corresponds to the object of security, and in which the execution means are disposed.
- the execution means disposed in the devices can be devised so that these means execute processing that generates white smoke.
- the terminal device of the present invention is characterized in that this terminal device comprises an antenna unit, a wireless transmitting and receiving unit that transmits and receives information via the antenna unit, a distance measuring unit that measures the distance to the device constituting the wireless transmitting and receiving partner by transmitting and receiving signals modulated by a specified code via the antenna unit and wireless transmitting and receiving unit, a data communications unit which performs data communications with the devices by transmitting and receiving signals modulated by a code via the antenna unit and wireless transmitting and receiving unit, an actuator which executes specified processing with respect to unauthorized intrusions, and a control unit which performs overall control.
- the actuator can be devised so that this actuator executes processing that generates white smoke.
- the terminal device can be further equipped with human body detection means that detect a human body between the terminal device and another terminal device by analyzing the waveform of a wireless communications signal between the terminal device and another terminal device, and the actuator can be devised so that the actuator executes processing for an unauthorized intrusion in cases where the human body detection means detect a human body.
- the second terminal device of the present invention is characterized in that this terminal device comprises distance measuring means that measure the distance between this second terminal device and a partner [terminal device], human body detection means that detect a human body between this second terminal device and this partner [terminal device], and transmitting means that transmit information indicating the measured distance between this second terminal device and partner [terminal device] or information indicating the detection of a human body.
- the first information processing method of the present invention comprises a distance measurement step in which the distance between the terminal device and partner [terminal device] is measured, a human body detection step in which a human body between the terminal device and the partner [terminal device] is detected by the waveform analysis of a wireless communications signal, and a transmission control step in which the transmission of information indicating the measured distance between the terminal device and partner [terminal device] or information indicating the detection of a human body is controlled.
- the first program of the present invention is characterized in that this program causes a computer to execute a distance measurement step in which the distance between the terminal device and partner [terminal device] is measured, a human body detection step in which a human body between the terminal device and the partner [terminal device] is detected by the waveform analysis of a wireless communications signal, and a transmission control step in which the transmission of information indicating the measured distance between the terminal device and partner [terminal device] or information indicating the detection of a human body is controlled.
- the information processing device of the present invention is characterized in that this device comprises distance measuring means that measured the distances to respective terminal devices from this information processing device, receiving means for receiving information indicating the distances between terminal devices, which is transmitted from the respective terminal devices, and judgment means for judging whether or not there has been an unauthorized intrusion into the object of security on the basis of the distances to the respective terminal devices from the information processing device or the distances between the respective terminal devices.
- the information processing device can be further equipped with human body detection means that detect a human body between the information processing device and respective terminal devices by waveform analysis of a wireless communications signal, and the judgment means can be devised so that these means judge whether or not there has been an unauthorized intrusion into the object of security on the basis of the detection of a human body.
- the receiving means can further receive information indicating the detection of a human body that is transmitted from the respective terminal devices, and the judgment means can be devised so that these means judge whether or not there has been an unauthorized intrusion into the object of security on the basis of information indicating the detection of a human body.
- the second information processing method of the present invention is characterized in that this method comprises a distance measurement step in which the distances from the [information processing device] to respective terminal devices are measured, a reception control step in which the reception of information indicating the distances between terminal devices (which is transmitted from the respective terminal devices) is controlled, and a judgment step in which a judgment is made as to whether or not there has been an intrusion into the object of security on the basis of the distances from the information processing device to the respective terminal devices or the distances between the terminal devices.
- the second program of the present invention is characterized in that this program causes a computer to execute a distance measurement step in which the distances from the [information processing device] to respective terminal devices are measured, a reception control step in which the reception of information indicating the distances between terminal devices (which is transmitted from the respective terminal devices) is controlled, and a judgment step in which a judgment is made as to whether or not there has been an intrusion into the object of security on the basis of the distances from the information processing device to the respective terminal devices or the distances between the terminal devices.
- the vehicle security system of the present invention comprises fixed terminal devices which are disposed on the inside surfaces of the respective doors of the vehicle and which measure the distances between other fixed terminal devices and a control terminal device, a mobile terminal device which is held by a person that has proper authorization to enter and exit the vehicle, and a control terminal device which is disposed inside the vehicle, and is characterized in that the variations in the distance between the fixed terminal devices disposed inside the vehicle and the control terminal device and the mutual distances between the fixed terminal devices are monitored when the position of the mobile terminal device is located outside an external security surface that is set by the fixed terminal devices disposed inside the vehicle and the control terminal device, it is judged that an abnormality has occurred in cases where the variation in distance satisfies specified conditions, and processing for unauthorized intrusions is executed in cases where it is judged that an abnormality has occurred.
- the processing for unauthorized intrusions can be devised so that white smoke is generated in this processing.
- the network system of the present invention comprises sensing means in which fixed nodes sense the surrounding environment, first wireless communications means, an actuator which applies an action to the outside, and control means which control the first wireless communications means so that information relating to the surrounding environment sensed by the sensing means is transmitted to a control node, and so that the actuator is caused to operate in accordance with commands from the control node, and is characterized in that the control node comprises second wireless communications means and selection means that select the fixed node for which the actuator is to be operated on the basis of information relating to the surrounding environment that is received from the fixed nodes, and the second wireless communications means transmits a command that operates the actuator to the selected fixed node.
- the second wireless communications means can be devised so that these means receive information relating to the surrounding environment (constituting information relating to the distances between fixed nodes) that is transmitted from the fixed nodes.
- the first setting method of the present invention is a setting method for a three-dimensional coordinate system using a first terminal device, second terminal device, third terminal device and fourth terminal device which are terminal devices comprising an antenna unit, a wireless transmitting and receiving unit that transmits and receives information via the antenna unit, a distance measuring unit that measures the distance to the device constituting the wireless transmitting and receiving partner by transmitting and receiving signals modulated by a specified code via the antenna unit and wireless transmitting and receiving unit, a data communications unit which performs data communications with the devices by transmitting and receiving signals modulated by a code via the antenna unit and wireless transmitting and receiving unit, an actuator which executes specified processing with respect to unauthorized intrusions, and a control unit which performs overall control, this setting method being characterized in that the position of the first terminal device is taken as the origin of the three-dimensional coordinate system, the distance between the first terminal device and second terminal device, the distance between the first terminal device and third terminal device and the distance between the second terminal device and third terminal device are respectively measured, the first axis of the three
- the second setting method of the present invention is the security surface setting method in the three-dimensional coordinate system set by the setting method according to claim 28, characterized in that the position of a fifth terminal device constituting a terminal device in the three-dimensional coordinate system is detected, the smallest rectangular solid in the three-dimensional coordinate system including a plurality of detected positions is determined, and the security surface is set on the basis of surface of the determined rectangular solid.
- the system of the present invention relates to a security system using a sensor network constructed from nodes in which a plurality of nodes that can generate node ID information and that allow the measurement of the distances between nodes and the detection of any intrusion between nodes are disposed in facilities such as (for example) homes, warehouses, offices, factories, hospitals, schools, vehicles or the like, and nodes are also held by authorized members of these facilities, and further relates to a security system using an actuator network in which the nodes are equipped with actuators, and these actuators are appropriately operated in accordance with the position of an unauthorized intruder.
- the positions of authorized members using the object of security are detected, the position of any unauthorized intrusion into the object of security is detected, processing with respect to unauthorized intrusions is executed by execution means disposed in a plurality of locations inside the object of security, execution means that execute processing are selected in accordance with the relationship between the detected positions of authorized members and the detected position of any unauthorized intrusion, and the execution of the processing of the selected execution means is controlled.
- the positions of authorized members using the object of security are detected, the position of any unauthorized intrusion into the object of security is detected, the position of an external security surface is stored in memory, the position of an internal security surface is stored in memory, the execution of first guard processing or second guard processing is controlled on the basis of the detected positions of authorized members so that first guard processing is executed in cases where no authorized member is present inside the external security surface, and so that second guard processing is executed in cases where an authorized member is present inside the internal security surface; furthermore, in cases where first guard processing or second guard processing is executed, processing for an unauthorized intrusion is executed when the position of an unauthorized intrusion into the object of security is detected.
- information is transmitted and received via the antenna unit, signals modulated by a specified code are transmitted and received via the antenna unit and wireless transmitting and receiving unit, so that the distance to the device constituting the wireless transmitting and receiving partner is measured, data communications with devices are performed by transmitting and receiving signals modulated by a specified code via the antenna unit and wireless transmitting and receiving unit, specified processing for unauthorized intrusions is executed, and the device as a whole is controlled.
- the distance to the partner [terminal device] is measured, a human body between this second terminal device and the partner [terminal device] is detected by the waveform analysis of a wireless communications signal, and information indicating the measured distance to the partner [terminal device] or information indicating the detection of a human body is transmitted.
- the distances to respective terminal devices from the information processing device are measured, information indicating the distances between terminal devices that is transmitted from the respective terminal devices is received, and a judgment as to whether or not there has been an unauthorized intrusion into the object of security is made on the basis of the distances from the information processing device to the respective terminal devices or the distances between terminal devices.
- the variations in the distances between the control terminal device and the fixed terminal devices disposed inside the vehicle and the distances between the fixed terminal devices are monitored; furthermore, in cases where the variation in the distance satisfies specified conditions, it is judged that an abnormality has occurred, and in cases where it is occurred that an abnormality has occurred, specified processing for an unauthorized intrusion is executed.
- the surrounding environment is sensed, an action is applied to the outside, and information relating to the sensed surrounding environment is transmitted to the control node; furthermore, a control action is performed so that the actuator is operated in accordance with commands from the control node, the fixed node for which the actuator is to be operated is selected on the basis of the information relating to the surrounding environment that is received from the fixed nodes, and the actuator is caused to operate on the selected fixed node.
- the position of the first terminal device is taken as the origin of the three-dimensional coordinate system, the distance between the first terminal device and second terminal device, the distance between the first terminal device and third terminal device and the distance between the second terminal device and third terminal device are respectively measured, the first axis of the three-dimensional coordinate system is specified by applying a specified mathematical operation to first measurement results indicating the distance between the first terminal device and second terminal device, the distance between the first terminal device and third terminal device and the distance between the second terminal device and third terminal device, the second axis of the three-dimensional coordinate system is specified by applying a specified mathematical operation to these first measurement results, the distance between the first terminal device and fourth terminal device, the distance between the second terminal device and fourth terminal device and the distance between the third terminal device and fourth terminal device are respectively measured, and the third axis of the three-dimensional coordinate system is specified from second measurement results indicating the distance between the first terminal device and fourth terminal device, the distance between the second terminal device and fourth terminal device and the distance between the third terminal device and fourth terminal device,
- Fig. 1 is a diagram which shows one embodiment of the security system of the present invention.
- the security system of the present invention is disposed in a home 1 which constitutes one example of the object of security.
- the user 2-1 and user 2-2 are authorized members using the home 1.
- the security system detects the position of the unauthorized intrusion of an unauthorized intruder 3, and executes specified processing with respect to this unauthorized intrusion.
- the security system of the present invention comprises a control localizer 11, fixed localizers 12-1 through 12-8, and mobile localizers 13-1 and 13-2.
- the fixed localizers 12-1 through 12-8 these localizers will be referred to simply as the fixed localizers 12.
- these localizers will be referred to simply as the mobile localizers 13.
- the number of fixed localizers 12 is three or greater, and the number of mobile localizers 13 may be set at an arbitrary number.
- localizers 12 and mobile localizers 13 will be referred to simply as localizers.
- the localizers are one example of terminal devices, and constitute a network system.
- a specified ID code can be transmitted by wireless transmission, so that the distance between a given node and other nodes can be measured by wireless, or so that the position of a given node itself can be measured.
- such a localizer detects unauthorized intrusions by means of the variation in the position of the localizer itself, or detects unauthorized intrusions by detecting a human body between localizers (i. e., in the sensing area).
- the fixed localizers 12 are fastened to an object that constitutes the object of security, whose position basically does not vary (i. e., an object that does not move).
- the control localizer 11 is fastened to this object that constitutes the object of security whose position basically does not vary (i. e., an object that does not move), so that the position of the control localizer 11 does not vary.
- the control localizer 11 also has the function of communicating with the outside, and the control function of summarizing status information regarding all of the localizers in the system and storing this information in memory.
- the control localizer 11 and fixed localizers 12 are fastened to fixed object in the home 1 such as window glasses, the vicinity of indoor window frames, the indoor surfaces of doors, the surfaces of indoor walls or ceilings, outdoor walls of the home, outdoor columns, gate posts or the like. Furthermore, the localizers are also fastened to outdoor vehicles 7, indoor electrical appliances, safes 6 or the like that are highly likely to be stolen.
- mobile localizers 13 are mounted on vehicles 7, for which movement is a prerequisite. Even a mobile localizer 13 may be automatically incorporated as a fixed localizer 12 into a wireless network consisting of fixed localizers 12 if this mobile localizer 13 is stationary for a specified period of time or longer.
- control localizer 11 is fastened to the inside of a wall of the home 1.
- the fixed localizer 12-1, fixed localizer 12-2 and fixed localizer 12-3 are fastened to the insides of walls of the home 1.
- the fixed localizer 12-4 is fastened to the inside of a door 5 of the home 1.
- the fixed localizer 12-5 is fastened to the inside of a window 4 of the home 1.
- the fixed localizer 12-6 is fastened to a safe 6.
- the fixed localizer 12-7 is fastened to the external structure of the home 1.
- the fixed localizer 12-8 (or a mobile localizer 13) is fastened to a vehicle 7.
- the position of the control localizer 11 is taken as the origin of a coordinate system (three-dimensional coordinate system) used for position measurement.
- three fixed localizers 12 centered on the control localizer 11 are disposed (for example) in the plus direction on the X axis, Y axis and Z axis, and a reference coordinate system (three-dimensional coordinate system) used to measure the positions of the fixed localizers 12 or mobile localizers 13 in terms of three-dimensional coordinates is set on the basis of the positions of the control localizer 11 and three fixed localizers 12.
- a reference coordinate system three-dimensional coordinate system
- the other fixed localizers 12 are further disposed in regions that are the object of monitoring inside and outside the home 1, and the positions of the fixed localizers 12 thus disposed in the three-dimensional coordinate system are registered (stored in memory).
- the users 2-1 and 2-2 who are authorized members of the home 1 such as family members, cohabitants or the like hold mobile localizers 13 that are capable of transmitting an ID code by wireless transmission.
- the control localizer 11 hypothetically sets an external security surface 22 on the outside of the home 1 so that this external security surface surrounds the home 1, and hypothetically sets one or more internal security surfaces 21 on the inside of the home 1 so that these internal security surfaces surround designated regions inside the home 1.
- the internal security surfaces 21 can be present only on the inside of the external security surface 22.
- Caretaker guard processing is automatically executed in cases where all of the mobile localizers 13 have exited to the outside of the external security surface 22.
- At-home guard processing is automatically executed in cases where all of the mobile localizers 13 have entered the interiors of the internal security surfaces 21 from the interior of the external security surface 22.
- Non-guard processing is automatically executed in cases where one or more mobile localizers 13 are present in the region between the internal security surfaces 21 and the external security surface 22.
- the setting of the internal security surfaces 21 and external security surface 22 is performed as follows. Specifically, after fixed localizers 12 are set inside and outside the home 1, the control localizer 11 is set in the external security surface setting mode.
- the users 2-1 and 2-2 holding the mobile localizers 13 move through the area outside the home 1, and when these users reach positions that are to be registered as points on the external security surface 22, the users press the position registration buttons of the mobile localizers 13.
- Positions on the external security surface 22 in the three-dimensional coordinate system are registered by performing this operation in a number of positions sufficient to specify the external security surface 22. Parameters that determine the rectangular solids used to determine the external security surface 22 are determined from the positions on the external security surface 22 in the three-dimensional coordinate system thus registered.
- one or more internal security surfaces 21 are set.
- the control localizer 11 is set in the internal security surface setting mode by the operation of the control localizer 11.
- the users 2-1 and 2-2 holding the mobile localizers 13 or on which the mobile localizers 13 are mounted
- the parameters of the rectangular solids used to determine the internal security surfaces 21 are determined from the plurality of points thus registered in the three-dimensional coordinate system.
- the security system automatically switches between three types of processing, i. e., caretaker guard processing, at-home guard processing and non-guard processing, in accordance with the position of the mobile localizer 13 and the positional relationship of the internal security surfaces 21 and external security surface 22.
- caretaker guard processing e.g., caretaker guard processing, at-home guard processing and non-guard processing
- the localizers that are close to the position of the unauthorized intruder 3 are caused to generate a warning sound or caused to generate white smoke when an unauthorized intrusion is detected in caretaker guard processing.
- the operation of the actuators is controlled so that the unauthorized intruder 3 tends not to approach the internal security surfaces 21, or the actuators are controlled so that the users 2-1 and 2-2 inside the internal security surfaces 21 can escape away from the unauthorized intruder 3.
- a wireless network system which detects abnormalities by comparing respective distances between nodes (i. e., a distance matrix) under ordinary circumstances and respective distances between nodes (i. e., a distance matrix) during monitoring has been named the "Hagoromo System" by the present applicant, and an outline of this system is displayed on the web site shown below. Below, a matrix which has the distances between nodes as elements will be called a distance matrix.
- a distance matrix between localizers (a matrix in which the distance between a localizer s and a localizer t is taken as the distance (s, t)) is monitored in a security system constituting a wireless network system consisting of a control localizer 11 and fixed localizers 12.
- the localizers contain batteries.
- the reason for this is as follows: namely, even if the unauthorized intruder 3 interrupts the power supply that is supplied to the home 1 (a so-called AC (alternating current) power supply) during the intrusion, the localizers can execute specified processing for the unauthorized intrusion if the localizers operate by means of an internal power supply.
- Various types of batteries such as fuel cells, lithium ion batteries or the like can be used as batteries in the localizers.
- batteries that can be charged may be disposed in the localizers, and may be used together with an AC power supply.
- solar batteries may be installed in localizers that are disposed outdoors.
- an AC power supply may be used for indoor localizers. As a result, the frequency of battery replacement can be reduced, so that the time and expense required for maintenance can be reduced.
- a surface fastener manufactured by Velcro Co. or Kurare K.K. can be used for the simple mounting of the localizers on objects (in more concrete terms, the walls of the home 1, doors, safes, glass or the like).
- the technique disclosed in United States Patent No. 5748891 may be used in the localizers.
- the localizers can measure the distances between localizers, and can detect variations in the waveforms of wireless signals transmitted between localizers, which are generated by the presence of objects between the localizers.
- the control localizer 11 uses a communications function between localizers to gather information that indicates the distances between these localizers or that indicates whether or not objects are present in the spaces between the localizers.
- the localizers may also be realized by using the technique disclosed in Japanese Patent Application Laid-Open No. 2002-228744 or Japanese Patent Application Laid-Open No. 2000-111638 together with a GPS (global positioning system) technique and a wireless communications technique.
- a GPS global positioning system
- the distances to objects between nodes are measured by a radar function
- the positions of the nodes are measured by the function of GPS receivers held on the nodes
- information relating to the distances to objects detected between the nodes as well as information relating to the positions of the nodes is transmitted to other nodes by a wireless communications function.
- Fig. 2 is a block diagram which shows an example of the construction of the control localizer 11.
- the control unit 41 comprises a built-in type microprocessor (MPU (micro-processing unit)), and controls and unifies the overall operation of the control localizer 11 by executing a control program.
- the memory 42 comprises a semiconductor memory that allows reading and writing.
- this memory 42 stores various types of parameters such as parameters that specify the external security surface 22, a distance matrix that indicates the distances between the control localizer 11 and the fixed localizers 12 and the distances between the fixed localizers 12, and the like.
- the control unit 41 stores various types of data (including parameters) in the memory 42, and reads out data that is stored in the memory 42.
- the distance measuring unit 43 transmits pulse sequences that are used to measure the distances to other localizers to the wireless transmitting and receiving unit 44 and antenna unit 45, and receives pulse sequences that are transmitted from other localizers.
- the distance measuring unit 43 calculates the distances between the control localizer 11 and the partner [localizers] from the time difference between the instant in time at which a pulse sequence is generated by another partner localizer and the instant in time at which the control localizer 11 receives a pulse sequence on the basis of the received pulse sequences that are supplied from the wireless transmitting and receiving unit 44.
- the distance measuring unit 43 supplies information indicating the distances between the control localizer 11 and the partner [localizers] to the control unit 41.
- the wireless transmitting and receiving unit 44 modulates a signal supplied from the distance measuring unit 43 or data communications unit 46 using an ID that specifies the network system assigned in network system units which is supplied from an ID code processing unit 47, and transmits signals by supplying the modulated signal to the antenna unit 45.
- the wireless transmitting and receiving unit 44 modulates the signals received via the antenna unit 45 using the ID specifying the network system (assigned in network system units) that is supplied from the ID code processing unit 47.
- the wireless transmitting and receiving unit 44 supplies the modulated signals to the distance measuring unit 43 or data communications unit 46.
- the antenna unit 45 receives the electromagnetic waves from the partners, and supplies signals corresponding to the received electromagnetic waves to the wireless transmitting and receiving unit 44. Furthermore, in cases where signals are to be transmitted to partners, the antenna unit 45 radiates electromagnetic waves on the basis of the signals supplied from the wireless transmitting and receiving unit 44, and transmits signals to the partners by wireless transmission.
- the data communications unit 46 communicates various types of data with other localizers via the wireless transmitting and receiving unit 44 and antenna unit 45 under the control of the control unit 41.
- the ID code processing unit 47 stores an ID that is peculiar to the control localizer 11 (hereafter called the localizer ID) and an ID specifying the network system (hereafter referred to as the network ID) that is assigned in units of the network system to which the control localizer 11 belongs (for example, a network system in units of one home 1 in cases where the security system is installed as a home security system).
- the ID code processing unit 47 supplies the localizer ID and network ID to the wireless transmitting and receiving unit 44.
- a speaker 48 which generates a warning sound and a white smoke generating module 49 which generates white smoke that is used to repulse the unauthorized intruder 3 are connected to the control unit 41.
- a wireless notification unit 50 which is used to make a wireless notification to a communications device belonging to a specified external party (e. g., the telephone of a security firm or the mobile phone of the owner of the home) is connected to the control unit 41.
- the input unit 51 comprises a mode changing switch or operating button, and supplies signals that designate the settings of the coordinate system, the setting of the external security surface 22, the settings of the internal security surface 21, or the selection of the mode such as the execution mode or the like to the control unit 41 in accordance with operations performed by the user 2-1 or 2-2.
- the display unit 52 comprises a liquid crystal display device, organic EL (electroluminescence) display device or the like, and displays the results of auto-diagnosis, the residual charges of the batteries of the respective localizers, the residual amounts of the white smoke raw material of the white smoke generating modules and the like (indicated by data received from the respective localizers) under the control of the control unit 41.
- the power supply unit 53 comprises a battery such as a primary cell or secondary cell, an AC (alternating current)-DC (direct current) converter or the like, and supplies a power source to respective parts of the control localizer 11.
- Fig. 3 is a block diagram which shows an example of the construction of the fixed localizers 12.
- the construction of the fixed localizers 12 is substantially the same as the construction of the control localizer 11; however, no wireless notification unit or display unit is installed in the fixed localizers 12.
- control unit 71 comprises a built-in type microprocessor (MPU), and controls and unifies the overall operation of the fixed localizers 12 by executing a control program.
- the memory 72 comprises a semiconductor memory that allows reading and writing, and stores various types of parameters that are required for various types of processing.
- the control unit 71 stores various types of data (including parameters) in the memory 72, and reads out data that is stored in the memory 72.
- the distance measuring unit 73 transmits (emits) pulse sequences that are used to measure the distances to other localizers to the wireless transmitting and receiving unit 74 and antenna unit 75, and receives pulse sequences that are transmitted from other localizers.
- the distance measuring unit 73 measures the distances between fixed localizers 12 and partner [localizers] from the time difference between the instant in time at which a pulse sequence is generated by another partner localizer and the instant in time at which a fixed localizer 12 receives a pulse sequence on the basis of the received pulse sequences that are supplied from the wireless transmitting and receiving unit 74.
- the distance measuring unit 73 supplies information indicating the distances between fixed localizers 12 and partner [localizers] to the control unit 71.
- the wireless transmitting and receiving unit 74 modulates a signal supplied from the distance measuring unit 73 or data communications unit 76 using a network ID which is supplied from an ID code processing unit 77, and transmits signals by supplying the modulated signal to the antenna unit 75.
- the wireless transmitting and receiving unit 74 demodulates the signals received via the antenna unit 75 using the network ID that is supplied from the ID code processing unit 77.
- the wireless transmitting and receiving unit 74 supplies the modulated signals to the distance measuring unit 73 or data communications unit 76.
- the antenna unit 75 receives the electromagnetic waves from the partners, and supplies signals corresponding to the received electromagnetic waves to the wireless transmitting and receiving unit 74. Furthermore, in cases where signals are to be transmitted to partners, the antenna unit 75 radiates electromagnetic waves on the basis of the signals supplied from the wireless transmitting and receiving unit 74, and transmits signals to the partners by wireless transmission.
- the data communications unit 76 communicates various types of data with other localizers via the wireless transmitting and receiving unit 74 and antenna unit 75 under the control of the control unit 71.
- the ID code processing unit 77 stores localizer IDs that are peculiar to the fixed localizers 12, and a network ID specifying the network system that is assigned in units of the network system to which the fixed localizers 12 belong.
- the ID code processing unit 77 supplies the localizer IDs and the network ID to the wireless transmitting and receiving unit 74.
- a speaker 78 that generates a warning sound and a white smoke generating module 79 which generates white smoke that is used to repulse unauthorized intruders 3 are connected to the control unit 71.
- the operating button 80 supplies signals that are used to select the mode such as coordinate system setting or the like to the control unit 71 in accordance with operations performed by the users 2-1 and 2-2. For example, when the operating button 80 is pressed, processing that sets the coordinate system with the control localizer 11 as the origin is executed. Details of the processing that sets the coordinate system will be described later.
- the power supply unit 81 comprises a battery such as a primary cell, secondary cell or the like, an AC-DC converter or the like, and supplies a power source to respective parts of the fixed localizers 12.
- Fig. 4 is a block diagram which shows an example of the construction of the mobile localizers 13.
- the construction of the mobile localizers 13 is substantially similar to the construction of the fixed localizers 12; however, no white smoke generating modules are installed in the mobile localizers 13.
- the mobile localizers 13 are constructed on the assumption that the users 2-1 and 2-2 constantly carry these localizes mounted in the form of a wristwatch or pendant.
- control unit 101 comprises a built-in type microprocessor (MPU), and controls and unifies the overall operation of the mobile localizers 13 by executing a control program.
- the memory 102 comprises a semiconductor memory that allows reading and writing, and stores various types of parameters that are required for various types of processing.
- the control unit 101 stores various types of data (including parameters) in the memory 102, and reads out data that is stored in the memory 102.
- the distance measuring unit 103 transmits (emits) pulse sequences used to measure distances to other localizers to the wireless transmitting and receiving unit 104 and antenna unit 105, and receives pulse sequences that are transmitted from other localizers.
- the distance measuring unit 103 calculates the distances between the mobile localizers 13 and partners from the time difference between the instant in time at which a pulse sequence is generated by another partner localizer and the instant in time at which a mobile localizer 13 receives a pulse sequence on the basis of the received pulse sequences that are supplied from the wireless transmitting and receiving unit 104.
- the distance measuring unit 103 supplies information indicating the distances between mobile localizers 13 and partner [localizers] to the control unit 101.
- the wireless transmitting and receiving unit 104 modulates a signal supplied from the distance measuring unit 103 or data communications unit 106 using a network ID which is supplied from an ID code processing unit 107, and transmits signals by supplying the modulated signal to the antenna unit 105.
- the wireless transmitting and receiving unit 104 modulates the signals received via the antenna unit 105 using the network ID that is supplied from the ID code processing unit 107.
- the wireless transmitting and receiving unit 104 supplies the modulated signals to the distance measuring unit 103 or data communications unit 106.
- the antenna unit 105 receives the electromagnetic waves from the partners, and supplies signals corresponding to the received electromagnetic waves to the wireless transmitting and receiving unit 104. Furthermore, in cases where signals are to be received by partners, the antenna unit 105 radiates electromagnetic waves on the basis of the signals supplied from the wireless transmitting and receiving unit 104, and transmits signals to the partners by wireless transmission.
- the data communications unit 106 communicates various types of data with other localizers via the wireless transmitting and receiving unit 104 and antenna unit 105 under the control of the control unit 101.
- the ID code processing unit 107 stores localizer IDs that are peculiar to the mobile localizers 13, and a network ID specifying the network system that is assigned in units of the network system to which the mobile localizers 13 belong.
- the ID code processing unit 107 supplies the localizer IDs and the network ID to the wireless transmitting and receiving unit 104.
- a speaker 108 used to generate a warning sound is connected to the control unit 101.
- the operating button 109 supplies signals that are used to select the mode to the control unit 101 in accordance with operations performed by the users 2-1 and 2-2.
- the power supply unit 110 comprises a battery or the like, and supplies a power source to various parts of the mobile localizers 13.
- the mode of the control localizer 11 shifts to the coordinate system setting mode. Then, the operator selects a fixed localizer 12-1 among the fixed localizers 12 that are already attached, and presses the operating button 80 of this fixed localizer 12-1.
- control localizer 11 and fixed localizer 12-1 measure the distance between the two localizers, and the control localizer 11 sets the fixed localizer 12-1 in a one-dimensional coordinate system (with the X axis as the positive direction) using the control localizer 11 as the origin.
- the operator selects the fixed localizer 12-2 which is on the same plane as the control localizer 11 and fixed localizer 12-1, and presses the operating button 80 that is disposed on this fixed localizer 12-2.
- the control localizer 11 and fixed localizer 12-1 measure the respective distances to the fixed localizer 12-2.
- the fixed localizer 12-1 transmits information indicating the distance from the fixed localizer 12-1 to the fixed localizer 12-2 to the control localizer 11.
- the distance between the control localizer 11 and fixed localizer 12-1 is expressed as the distance a
- the distance between the control localizer 11 and the fixed localizer 12-2 is expressed as the distance b
- the distance between the fixed localizer 12-1 and fixed localizer 12-2 is expressed as the distance c.
- Equations (1) and (2) hold true for the position (x2, y2) of the fixed localizer 12-2 in the two-dimensional coordinate system.
- x2 (c 2 -b 2 -a 2 )/2a
- y2 (b 2 -x2 2 ) 1/2
- control localizer 11 is present at the origin, so that the position of the control localizer 11 in the three-dimensional coordinate system is (0, 0, 0).
- the position of the fixed localizer 12-1 in the three-dimensional coordinate system is (a, 0, 0).
- the position of the fixed localizer 12-2 in the three-dimensional coordinate system is (x2, y2, 0).
- the operator selects the fixed localizer 12-3 which is not on the plane formed by the control localizer 11, fixed localizer 12-1 and fixed localizer 12-2 (i. e., which is in a position that is removed from this plane), and presses the operating button 80 that is disposed on this fixed localizer 12-3.
- the fixed localizers 12-1 through 12-3 transmit information indicating the distance between the control localizer 11 and the fixed localizer 12-3, the distance between the fixed localizer 12-1 and the fixed localizer 12-3 and the distance between the fixed localizer 12-2 and the fixed localizer 12-3 to the control localizer 11.
- the control localizer 11 determines the position (x3, y3, z3) of the fixed localizer 12-3 in the three-dimensional coordinate system by solving simultaneous equations with the position of the fixed localizer 12-3 in the three-dimensional coordinate system as the unknown quantity.
- the control localizer 11 stores information indicating the positions of the respective fixed localizers 12 in the three-dimensional coordinate system in association with the localizer IDs of these fixed localizers 12.
- the positions of the fixed localizers 12 or mobile localizers 13 (in the three-dimensional coordinate system) on which attention is focused can be determined by solving simultaneous equations.
- the respective fixed localizers 12 within the network system measure the distances to the fixed localizers 12 whose three-dimensional coordinates have already been registered, and measured distance transmission information in the format shown below, which includes the measured distances, is transmitted to the control localizer 11.
- the localizer IDs can be used as the "own node number” and "partner node number”. Furthermore, in the network system, for example, node numbers indicating the order of registration which are assigned at the time of registration can be used as the "own node number” and "partner node number”.
- the control localizer 11 stores a distance matrix between localizers or a list of the position coordinates of localizers as a fingerprint constituting specific information relating to the network system consisting of the control localizer 11 and fixed localizers 12. If the elements of the inter-localizer distance matrix indicating the distances between localizers s and localizers t are designated as M(s, t), then M(s, t) can be expressed by Equation (3).
- distance(s, t) is a value that indicates the distance between a localizer s and a localizer t.
- the user 2-1 or 2-2 operates the input unit 51 of the control localizer 11, so that the mode of the control localizer 11 is shifted to the setting mode for the external security surface 22.
- the operator sets the external security surface 22 as follows:
- the operator moves the mobile localizer 13 to the presumed vicinity of the external security surface 22.
- the operator presses the operating button 109 (as a position registration button) of the mobile localizer 13.
- the fixed localizers 12 respectively measure the distances from themselves to the mobile localizer 13 in this case, and the measured distances are transmitted to the control localizer 11 as measured distance transmission information in the format described above.
- the control localizer 11 calculates the position of the mobile localizer 13 in the three-dimensional coordinate system on the basis of the distances between the respective fixed localizers 12 and the mobile localizer 13 contained in the measured distance transmission information that is transmitted from the respective fixed localizers 12, and stores the calculated position of the mobile localizer 13 in the three-dimensional coordinate system as a registration point.
- the processing of the first step through third step is repeated until the number of registration points reaches a specified number, e. g., 10 points.
- a specified number e. g. 10 points.
- the operator registers the positions in the three-dimensional coordinate system so that lines connecting the registration points are present on all of the planes of the envisioned external security surface 22.
- the control localizer 11 determines the smallest rectangular solid that surrounds the registered registration points.
- the floor surface of this smallest rectangular solid is set as a plane that is 1 meter lower than the mean value of the z coordinate positions (positions in the vertical direction of the three-dimensional coordinate system) of the respective registration points.
- the reason for this is that the positioning of the mobile localizer 13 in the vicinity of the floor surface or the vicinity of the ceiling surface is in most cases either difficult to accomplish, or else requires an unreasonable physical attitude on the part of the operator.
- the control localizer 11 enlarges the smallest rectangular solid determined by the processing of the fourth step by a specified factor (e. g., 150%) about the center point of this smallest rectangular solid, and registers (stores in memory) the surface of the enlarged rectangular solid as the external security surface 22.
- a specified factor e. g. 150% about the center point of this smallest rectangular solid
- registers stored in memory
- the external security surface 22 can be set outside the home 1 by movement only inside the home 1.
- Such internal security surfaces 21 are set in cases where a warning of intrusions from the outside is to be made even in cases where authorized members such as the users 2-1, 2-2 and the like are present inside the home, as in a home security system.
- the security system can be devised so that monitoring processing between the internal security surfaces 21 and external security surface 22 can be automatically executed.
- the user 2-1 or 2-2 (constituting the operator) operates the input unit 51 of the control localizer 11 so that the mode of the control localizer 11 is shifted to the setting mode for the internal security surfaces 21. Then, the operator sets the internal security surfaces 21 as follows while carrying one of the mobile localizers 13.
- the operator moves the mobile localizer 13 to the presumed vicinity of the internal security surface 21.
- the operator presses the operating button 109 (as a position registration button) of the mobile localizer 13.
- the fixed localizers 12 respectively measure the distances from themselves to the mobile localizer 13 in this case, and the measured distances are transmitted to the control localizer 11 as measured distance transmission information in the format described above.
- the control localizer 11 calculates the position of the mobile localizer 13 in the three-dimensional coordinate system on the basis of the distances between the respective fixed localizers 12 and the mobile localizer 13 contained in the measured distance transmission information that is transmitted from the respective fixed localizers 12, and stores the calculated position of the mobile localizer 13 in the three-dimensional coordinate system as a registration point.
- the processing of the first step through third step is repeated until the number of registration points reaches a specified number, e. g., 10 points.
- a specified number e. g. 10 points.
- the operator registers the positions in the three-dimensional coordinate system so that lines connecting the registration points are present on all of the planes of the envisioned internal security surfaces 21.
- the control localizer 11 determines the smallest rectangular solid that surrounds the registered registration points.
- the floor surface of this smallest rectangular solid is set as a plane that is 1 meter lower than the mean value of the z coordinate positions (positions in the vertical direction of the three-dimensional coordinate system) of the respective registration points
- the ceiling surface of the smallest rectangular solid is set as a place that is 1 meter upper than the mean value of the z coordinate positions (positions in the vertical direction of the three-dimensional coordinate system) of the respective registration points.
- the reason for this is that the positioning of the mobile localizer 13 in the vicinity of the floor surface or the vicinity of the ceiling surface is in most cases either difficult to accomplish, or else requires an unreasonable physical attitude on the part of the operator.
- control localizer 11 registers (stores in memory) the smallest rectangular solid determined by the processing of the fourth step as an internal security surface 21.
- control localizer 11 is disposed on the inside wall of a home 1 constituting one example of an object of security. Furthermore, a fixed localizer 12-1 and a fixed localizer 12-2 are disposed on the wall on which the control localizer 11 is disposed. Moreover, a fixed localizer 12-3 is disposed on a different wall from the wall on which the control localizer 11 is disposed.
- the respective localizers are fastened to these objects by means of surface fasteners.
- a three-dimensional coordinate system with the control localizer 11 as the origin is set by the processing described above, the positions of all of the fixed localizers 12 in the three-dimensional coordinate system are measured, and the control localizer 11 stores the positions of the respective localizers in the three-dimensional coordinate system in memory in association with the localizers IDS of the respective localizers.
- the external security surface 22 and internal security surfaces 21 are set.
- the users 2-1 and 2-2 who are authorized members (inhabitants) of this home 1 have mobile localizers 13 mounted on their bodies as pendants or wristwatches.
- one internal security surface 21 may be set inside one external security surface 22 as shown in Fig. 1, or two internal security surfaces 21, i. e., an internal security surface 21-1 and an internal security surface 21-2, may be set inside one external security surface 22 as shown in Fig. 6. In this latter case, the processing that sets an internal security surface 21 is performed twice. Furthermore, the number of internal security surfaces 21 may be an arbitrary number.
- the processing of the execution mode is performed on the basis of the registered external security surface 22 or internal security surfaces 21.
- a shift to another mode can be effected if the switch of the input unit 51 of the control localizer 11 is operated. Specifically, the processing of the execution mode is ended, and the execution of the processing of another mode that is to be started is initiated, by the processing of step S7 in Fig. 7 described later.
- the processing that is started is automatically switched in accordance with the positional relationship of the mobile localizer 13, external security surface 22 and internal security surfaces 21.
- one of three types of processing i. e., caretaker guard processing, at-home guard processing or non-guard processing, is automatically started at an appropriate time.
- step S1 the control localizer 11 and fixed localizers 12 measure the positions of all of the mobile localizers 13 that issue ID codes (network IDs) for authorized members.
- control localizer 11 transmits instructions to measure and report the distances to the mobile localizers 13 to the respective fixed localizers 12 in the network system.
- the distance measuring units 73 of the respective fixed localizers 12 receiving these instructions measure the distances to the respective mobile localizers 13.
- Each of the fixed localizers 12 notifies the control localizer 11 of the distances to the mobile localizers 13 by transmitting measured distance transmission information in the abovementioned format that indicates the distances between itself and the respective mobile localizers 13 to the control localizer 11.
- the distance measuring unit 43 of the control localizer 11 measures the distances to the mobile localizers 13.
- the control localizer 11 calculates and stores in memory the positions of the respective mobile localizers 13 on the basis of the results of the measurement of the distances to the mobile localizers 13 and the notification from the respective fixed localizers 12.
- step S2 the control unit 41 of the control localizer 11 judges whether or not there are mobile localizers 13 for which position measurement has been successful. Specifically, if there are absolutely no mobile localizers 13 in places that allow measurement of the distance between these mobile localizers and fixed localizers 12, or in cases where such mobile localizers are present, but comprise only mobile localizers 13 whose distance cannot be measured because of loss of the battery power supply, the control localizer 11 judges that there are no mobile localizers 13 allowing successful position measurement.
- control localizer 11 and fixed localizers 12 cannot communicate with other mobile localizers 13 belonging to the network system so that mutual distances cannot be measured, and only mobile localizers 13 belonging to other networks are in positions that allow communication and distance measurement, the control localizer 11 judges that there are no mobile localizers 13 allowing successful position measurement.
- the mobile localizers 13 communicate or judge mutual distances by means of signals modulated using a network ID which is a code peculiar to the network system to which these mobile localizers 13 belong. In cases where there are one or more mobile localizers 13 allowing successful position measurement belonging to the network system to which a given mobile localizer 13 belongs, it is judged that there are mobile localizers 13 allowing successful position measurement.
- step S2 In cases where it is judged in step S2 that there are mobile localizers 13 allowing successful position measurement, the processing proceeds to step S3, and the control unit 41 of the control localizer 11 judges whether or not mobile localizers 13 are present inside the external security surface 22.
- the control localizer 11 judges whether or not mobile localizers 13 are present inside the external security surface 22 by comparing the coordinate positions indicating the scope of the external security surface 22 and the coordinate positions of the mobile localizers 13.
- step S3 In cases where it is judged in step S3 that there are mobile localizers 13 present inside the external security surface 22, the processing proceeds to step S4, and the control unit 41 of the control localizer 11 judges whether or not internal security surface 21 have been set.
- the bedroom region is taken as an internal security surface 21.
- the network system of the bedroom is appropriately controlled, and the operation of the actuators (e. g. white smoke generating modules 49) can be controlled so that unauthorized intruders 3 do not approach the internal security surface 21 (e. g., bedroom).
- step S4 In cases where it is judged in step S4 that an internal security surface 21 has been set, the processing proceeds to step S5.
- step S5 the control unit 41 of the control localizer 11 judges whether or not all of the mobile localizers 13 allowing successful position measurement are positioned inside the internal security surface 21. For example, in cases where the internal security surface 21 is the bedroom, it is judged whether or not [all of] the authorized members using the home 1 are in the bedroom.
- step S5 In cases where it is judged in step S5 that not all of the mobile localizers 13 allowing successful position measurement are positioned inside the internal security surface 21, the processing proceeds to step S6, the control localizer 11 executes non-guard processing, and the processing proceeds to step S7.
- step S6 the control localizer 11 executes non-guard processing, and the processing proceeds to step S7. The details of non-guard processing will be described later.
- step S5 In cases where it is judged in step S5 that not all of the mobile localizers 13 allowing successful position measurement are positioned inside the internal security surface 21, since it has been judged in step S3 that mobile localizers 13 positioned inside the external security surface 22 are present, and since it has been judged in step S4 that an internal security surface 21 has been set, this means that (for example) either the mobile localizer 13-1 or the mobile localizer 13-3 is positioned on the outside of the internal security surface 21 and on the inside of the external security surface 22 as shown in Fig. 8. In such cases, since there is no need to perform guard processing, non-guard processing is performed.
- step S7 the control unit 41 of the control localizer 11 judges whether or not mode switching has been instructed. For example, in step S7, the control localizer 11 checks in order to ascertain whether or not an operation shifting to another mode such as the setting of an internal security surface 21, the setting of an external security surface 22 or the like has been applied to the input unit 51.
- step S7 In cases where it is judged in step S7 that no mode change has been instructed, the processing returns to step S1, and the abovementioned processing is repeated.
- step S7 In cases where it is judged in step S7 that a mode change has been instructed, the processing of the execution mode is ended.
- step S5 In cases where it is judged in step S5 that all of the mobile localizers 13 allowing successful position judgment are positioned inside the internal security surface 21, the processing proceeds to step S8, the control localizer 11 executes at-home guard processing, and the processing proceeds to step S7.
- the details of at-home guard processing will be described later.
- step S5 In cases where it is judged in step S5 that all of the mobile localizers 13 allowing successful position judgment are positioned inside the internal security surface 21, since it has been judged in step S3 that mobile localizers 13 positioned inside the external security surface 22 are present, and since it has been judged in step S4 that an internal security surface 21 has been set, this means that (for example) both of the mobile localizers 13-1 and 13-2 are positioned inside the internal security surface 21 as shown in Fig. 9. In such cases, since it is necessary to protect the authorized members inside the internal security surface 21, at-home guard processing is executed.
- step S4 In cases where it is judged in step S4 that no internal security surface 21 has been set, the processing proceeds to step S9, the control localizer 11 executes non-guard processing, and the processing then proceeds to step S7.
- step S3 In cases where it is judged in step S3 that no mobile localizers 13 positioned inside the external security surface 22 are present, or in cases where it is judged in step S2 that there are no mobile localizers 13 allowing successful position measurement, i. e., in cases where the positions of all of the mobile localizers 13 allowing successful position judgment are outside the external security surface 22, the processing proceeds to step S10, the control localizer 11 executes caretaker guard processing, and the processing then proceeds to step S7.
- the home security system of the present invention does not require a bothersome operation, and can securely perform processing that securely protects the object of security.
- Fig. 11 is a flow chart which illustrates the details of non-guard processing corresponding to the processing of step S6 or step S9 in Fig. 7.
- control localizer 11 and respective fixed localizers 12 measure the distances between the control localizer 11 and the fixed localizers 12, and the distances between the respective fixed localizers 12.
- the distance measuring unit 43 of the control localizer 11 measures the distances between the control localizer 11 and the respective fixed localizers 12, and supplies the measurement results to the control unit 41.
- the distance measuring units 73 of the respective fixed localizers 12 measure the distances between themselves and the other fixed localizers 12.
- the control units 71 of the respective fixed localizers 12 cause the wireless transmitting and receiving units 74 to transmit measured distance transmission information indicating the distances between themselves and other fixed localizers 12 obtained by this measurement to the control localizer 11.
- the control unit 41 of the control localizer 11 causes the wireless transmitting and receiving unit 44 to receive the measured distance transmission information indicating the distances between the fixed localizers 12 that is transmitted from the respective fixed localizers 12.
- the control unit 41 of the control localizer 11 acquires the measured distance transmission information indicating the distances between the fixed localizers 12 that is received by the wireless transmitting and receiving unit 44 via the data communications unit 46.
- the control localizer 11 produces an inter-localizer distance matrix that indicates the distances between the control localizer 11 and the fixed localizers 12, and the distances between the respective fixed localizers 12.
- the control unit 41 of the control localizer 11 produces an inter-localizer distance matrix whose elements are the distances between the control localizer 11 and fixed localizers 12 and the distances between the respective fixed localizers 12 by arranging values that indicate the distances between the control localizer 11 and the respective fixed localizers 12 and values that indicate the distances between the respective fixed localizers 12 in the order of the values of the localizer IDs on the basis the measured distance transmission information indicating the distances between the control localizer 11 and the respective fixed localizers 12 and the distances between the respective fixed localizers 12 acquired by the processing of step S21.
- step S23 the control localizer 11 stores the inter-localizer distance matrix in memory.
- the control unit 41 of the control localizer 11 stores the inter-localizer distance matrix in the memory 42.
- step S24 the control localizer 11 and respective fixed localizers 12 perform an auto-diagnosis.
- the control localizer 11 and respective fixed localizers 12 respectively diagnose the respective units that constitute these localizers themselves.
- control localizer 11 and respective fixed localizers 12 perform an auto-diagnosis by investigating the residual charge of the batteries of the power supply unit 53 or power supply unit 81, and the residual amount of the raw materials of the white smoke or the like of the white smoke generating modules 49 or white smoke generating modules 79.
- control localizer 11 and respective fixed localizers 12 perform an auto-diagnosis by comparing the residual charge of the batteries of the power supply unit 53 or power supply unit 81 with a specified threshold value, or comparing the residual amount of the raw materials of the white smoke or the like of the white smoke generating modules 49 or white smoke generating modules 79 with another specified threshold value.
- the fixed localizers 12 notify the control localizer 11 of the results of this auto-diagnosis.
- step S25 the control unit 41 of the control localizer 11 judges whether or not there is any trouble on the basis of the results of the auto-diagnosis of the control localizer 11 and the results of the auto-diagnosis of the respective fixed localizers 12 (of which the control localizer 11 has been notified by the respective fixed localizers 12).
- step S26 the control unit 41 of the control localizer 11 operates the speaker 48 or the display unit 52, thus notifying the users 2-1 and 2-2 of the trouble, and the non-guard processing is ended.
- the control unit 41 causes the speaker to output a sound that indicates the content of the trouble.
- the control unit 41 causes the display device 52 to display an image or characters that indicate the content of the trouble.
- step S25 In cases where it is judged in step S25 that there is no trouble, since there is no need for notification of trouble, the processing of step S26 is skipped, and the non-guard processing is ended.
- steps S21 through S26 may be repeated.
- Fig. 12 is a flow chart illustrating the details of at-home guard processing, which corresponds to the processing of step S8 in Fig.7.
- control localizer 11 and respective fixed localizers 12 measure the distances between the control localizer 11 and the fixed localizers 12, and the distances between the respective fixed localizers 12.
- the distance measuring unit 43 of the control localizer 11 measures the distances between the control localizer 11 and the respective fixed localizers 12, and supplies the measurement results to the control unit 41.
- the distance measuring units 73 of the respective fixed localizers 12 measure the distances between themselves and other fixed localizers 12.
- the control units 71 of the respective fixed localizers 12 cause the wireless transmitting and receiving units 74 to transmit measured distance transmission information indicating the distances between themselves and other fixed localizers 12 (acquired by the abovementioned measurements) to the control localizer 11.
- the control unit 41 of the control localizer 11 causes the wireless transmitting and receiving unit 44 to receive measured distance transmission information indicating the distances between respective fixed localizers 12 that is transmitted from the respective fixed localizers 12.
- the control unit 41 of the control localizer 11 acquires the measured distance transmission information indicating the distances between the respective fixed localizers 12 that is received by the wireless transmitting and receiving unit 44 via the data communications unit 46.
- the control localizer 11 produces an inter-localizer distance matrix that indicates the distances between the control localizer 11 and fixed localizers 12, and the distances between the respective fixed localizers 12.
- the control unit 41 of the control localizer 11 produces an inter-localizer distance matrix whose elements are the distances between the control localizer 11 and fixed localizers 12 and the distances between the respective fixed localizers 12 by arranging values that indicate the distances between the control localizer 11 and the respective fixed localizers 12 and values that indicate the distances between the respective fixed localizers 12 in the order of the values of the localizer IDs on the basis the measured distance transmission information indicating the distances between the control localizer 11 and the respective fixed localizers 12 and the distances between the respective fixed localizers 12 acquired by the processing of step S41.
- step S43 the control unit 41 of the control localizer 11 judges whether or not there are any differences between the inter-localizer distance matrix that is produced and an inter-localizer distance matrix stored in memory for the control localizer 11 and fixed localizers 12 that are inside the external security surface 22 and outside the internal security surface 21.
- the inter-localizer distance matrix that is stored in memory is further updated to values that indicated the distances between the localizers at that point in time (i. e., the point in time at which the non-guard processing is executed). Accordingly, in step S43, differences between the last updated inter-localizer distance matrix and the current inter-localizer distance matrix are detected. These differences are calculated as the sum of the absolute values of the differences for each corresponding element in the range in which distance measurement is possible within the inter-localizer distance matrix that is stored in memory and the inter-localizer distance matrix at the current point in time.
- the control units 41 judge that there is an abnormality (i. e., "abnormality present") if the abovementioned sum exceeds a predetermined threshold value. If the fixed localizers 12 are mounted on the window 4, door 5 or safe 6 as shown in Fig. 1, then the distances between the localizers mounted on the window 4 and door 5 and other localizers will vary if the window 4 moves (is opened), or if the door 5 moves (is opened). The same is true if the safe 6 moves. As a result, the inter-localizer distance matrix varies.
- step S43 In cases where it is judged in step S43 that there are no differences between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory for the control localizer 11 and fixed localizers 12 that are inside the external security surface 22 and outside the internal security surface 21, the processing proceeds to step S44, and the control localizer 11 and fixed localizers 12 analyze the wireless signals communicating with the outside of the internal security surface 21.
- the control localizer 11 and fixed localizers 12 detect the presence of a human body between the control localizer 11 and fixed localizers 12, or between the respective fixed localizers 12, by waveform analysis.
- a fixed localizer 12 that has detected the presence of a human body then notifies the control localizer 11 of the detection of this human body by transmitting human body detection information in the format shown below to the control localizer 11.
- the localizer IDs can be used as the "own node number” and "partner node number”. Furthermore, in the network system, for example, node numbers indicating the order of registration which are assigned at the time of registration can be used as the "own node number” and "partner node number”.
- the human body detection information indicates that a human body has been detected between the localizer indicated by the "own node number" and the localizer indicated by the "partner node number”.
- a flag indicating the presence or absence of a human body or a parameter indicating the thickness of the human body may be used as a detection parameter in this case.
- the respective fixed localizers 12 transmit human body detection information indicating the results of the waveform analysis of the wireless signal to the control localizer 11.
- step S45 the control unit 41 of the control localizer 11 judges whether or not a human body is present between the control localizer 11 and fixed localizers 12 or between the respective fixed localizers 12 inside the external security surface 22 and outside the internal security surface 21 on the basis of the human body detection information that is transmitted from the respective fixed localizers 12, or the results of human body detection by the control localizer 11 itself.
- step S45 In cases where it is judged in step S45 that no human being is present between the control localizer 11 and fixed localizers 12 or between the respective fixed localizers 12 on the inside of the external security surface 22 and on the outside of the internal security surfaces 21, the processing proceeds to step S46, and the control unit 41 of the control localizer 11 judges whether or not other guard processing has been executed.
- step S46 in cases where it is judged that other guard processing is not being performed, the processing returns to step S41, and the abovementioned processing is repeated.
- step S46 in cases where it is judged that other guard processing has been performed, the at-home guard processing is ended.
- step S43 In cases where it is judged in step S43 that there are differences between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory for the control localizer 11 and fixed localizers 12 that are inside the external security surface 22 and outside the internal security surface 21, or in cases where it is judged in step S45 that a human being is present between the control localizer 11 and fixed localizers 12 or between the respective fixed localizers 12 that are inside the external security surface 22 and outside the internal security surface 21, an unauthorized intrusion has occurred; accordingly, the procedure proceeds to step S47.
- step S47 the control unit 41 causes the wireless communications unit 50 to notify a specified reporting destination of the occurrence of an abnormality.
- the wireless communications unit 50 reports the occurrence of an abnormality by wireless transmission to the communications device of a specified outside party such as the mobile telephone of the homeowner, the telephone of a security firm or the like.
- steps S48 through S50 authorized members such as the users 2-1 and 2-2 of the home 1 inside the internal security surface 21 are informed of the presence of an unauthorized intruder; furthermore, the unauthorized intruder 3 tends not to approach the internal security surface 21.
- the authorized members such as the users 2-1 and 2-2 of the home 1 are given evacuation guidance in a direction away from the position of the unauthorized intruder 3.
- step S48 the control unit 41 of the control localizer 11 causes the white smoke generating module 49 or the white smoke generating modules 79 of the fixed localizers 12 to emit white smoke.
- the white smoke generating module 49 or white smoke generating modules 79 generate white smoke that is harmless to the human body or to various types of equipment by heating a mixture of propylene glycol and water to a temperature of approximately 200°C. If localizers are thus prepared beforehand so that these localizers contain a white smoke generating module 49 or white smoke generating modules 79, white smoke can be generated when an unauthorized intruder 3 is detected.
- control unit 41 of the control localizer 11 specifies the position (range) of the unauthorized intruder 3 in the three-dimensional coordinate system from elements in which differences are generated between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory, or from the spaces between the control localizer 11 and fixed localizers 12 or the spaces between respective fixed localizers 12 in which a human body is judged to be present. Furthermore, the control unit 41 of the control localizer 11 selects the control localizer 11 (itself) or a fixed localizer 12 that is close to the position of the unauthorized intruder 3 in the three-dimensional coordinate system.
- the white smoke generating module 49 is caused to emit white smoke.
- the data communications unit is caused to transmit a command that causes the emission of white smoke to the selected fixed localizer 12 via the wireless transmitting and receiving unit 44.
- this command that causes the emission of white smoke contains the localizer ID that is peculiar to the selected fixed localizer 12.
- the control units 71 of the fixed localizers 12 When such a command that causes the emission of white smoke is transmitted via wireless transmission, the control units 71 of the fixed localizers 12 cause the wireless transmitting and receiving units 74 to receive this command, and cause the data communications units 76 to extract the localizer ID contained in this command.
- the control units 71 of the fixed localizers 12 make a judgment as to whether or not the extracted localizer ID is the same as their own localizer ID. In cases where the control unit 71 of the fixed localizer 12 judges that the extracted localizer ID is the same as its own localizer ID, a command causing the mission of white smoke is transmitted to this fixed localizer 12 itself; accordingly, the white smoke generating module 79 is caused to generate white smoke.
- control units 71 of the fixed localizers 12 judge that the extracted localizer ID is not the same as their own localizer ID, these control units 71 do not emit white smoke.
- step S49 the control unit 41 of the control localizer 11 causes the speaker 48 or the speakers 78 of the fixed localizers 12 to generate a warning sound.
- control unit 41 of the control localizer 11 specifies the position (range) of the unauthorized intruder 3 in the three-dimensional coordinate system from elements in which differences are generated between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory, or from the spaces between the control localizer 11 and fixed localizers 12 or spaces between the respective fixed localizers 12 in which it is judged that a human being is present. Then, the control unit 41 of the control localizer 11 selects a control localizer 11 (i. e., itself) or fixed localizer 12 that is close to the position of the unauthorized intruder 3 in the three-dimensional coordinate system.
- the speaker 48 is caused to generate a warning sound.
- the data communications unit is caused to transmit a command that generates a warning sound to the selected fixed localizer 12 via the wireless transmitting and receiving unit 44.
- the command that generates a warning sound contains a localizer ID that is peculiar to the selected fixed localizers 12.
- the control unit 71 of the fixed localizer 12 When a command that generates a warning sound is transmitted via wireless transmission, the control unit 71 of the fixed localizer 12 causes the wireless transmitting and receiving unit 74 to receive the command, and causes the data communications unit 76 to extract the localizer ID that is contained in the command.
- the control unit 71 of the fixed localizer 12 judges whether or not the extracted localizer ID is the same as its own localizer ID. In cases where the control unit 71 of the fixed localizer 12 judges that the extracted localizer ID is the same as its own localizer ID, since a command that generates a warning sound is transmitted to this fixed localizer 12 itself, the speaker 78 is caused to generate a warning sound.
- step S48 and step S49 a warning sound is generated and white smoke is generated from a fixed localizer 12 in the location where the unauthorized intruder is detected (i. e., a fixed localizer 12 whose coordinate position varies or a fixed localizer 12 that has detected a human body between itself and another fixed localizer 12).
- control localizer 11 can transmit commands to respective fixed localizers 12 by wireless communications so that a warning sound is generated and white smoke is generated only from localizers that have detected a human body or localizers whose three-dimensional coordinate position has varied (and surrounding localizers). Consequently, a warning sound and white smoke are generated in various movement destinations within the home 1 in the vicinity of the intrusion of the unauthorized intruder 3.
- actuators which have the effect of generating white smoke and actuators which have the effect of generating a warning sound are spatially dispersed, and a wireless communications network is formed, so that this system acts as an actuator network system in which actuators that are suitable for responding to abnormalities on the spot act in accordance with the locations in which such abnormalities occur.
- fixed localizers 12 which are located outside the internal security surface 21 and within a specified distance from the position of the unauthorized intruder 3 generate a warning sound and generate white smoke.
- the fixed localizer 12 that is closest to the unauthorized intruder 3 may contain another repelling function, and may activate this repelling function.
- repelling functions include the emission of a tear agent spray, an increase in the sound volume of the warning sound and the like.
- step S50 the control unit 41 of the control localizer 11 causes the speaker 48 or the speakers 78 of the fixed localizers 12 to generate a sound that provides evacuation guidance.
- control localizer 11 measures the distance to the mobile localizer 13. Furthermore, the control localizer 11 transmits commands that cause the respective fixed localizers 12 to measure the distances from these fixed localizers 12 to the mobile localizer 13. The respective fixed localizers 12 measure the distances to the mobile localizer 13 and transmit the measurement results to the control localizer 11.
- the control localizer 11 calculates the position of the mobile localizer 13 in the three-dimensional coordinate system on the basis of information indicating the distance to the mobile localizer 13 measured by the control localizer 11 itself, and information indicating the distances from the respective fixed localizers 12 to the mobile localizer 13 transmitted from the respective fixed localizers 12.
- control unit 41 of the control localizer 11 selects the control localizer 11 (i. e., itself) or fixed localizer 12 in the position that is closest to the position of the mobile localizer 13 in the three-dimensional coordinate system.
- the speaker 48 is caused to generate a sound that provides evacuation guidance.
- the data communications unit is caused to transmit a command that generates a sound providing evacuation guidance to the selected fixed localizer 12 via the wireless transmitting and receiving unit 44.
- the command that generates a warning sound contains a localizer ID that is peculiar to the selected fixed localizer 12.
- the control unit 71 of the fixed localizer 12 causes the wireless transmitting and receiving unit 74 to receive the command, and causes the data communications unit 76 to extract the localizer ID that is contained in the command.
- the control unit 71 of the fixed localizer 12 judges whether or not the extracted localizer ID is the same as its own localizer ID.
- the control unit 71 of the fixed localizer 12 judges that the extracted localizer ID is the same as its own localizer ID, since a command that generates a sound providing evacuation guidance is transmitted to the fixed localizer 12 itself, the speaker 78 is caused to generate a sound providing evacuation guidance.
- a fixed localizer 12 which is located at a specified distance or less from the mobile localizer 13, and which is furthest from the unauthorized intruder 3 generates a sound (evacuation guidance sound) that differs from the warning sound.
- the authorized members of the home 1 can automatically move away from the unauthorized intruder 3 by moving toward this evacuation guidance sound.
- step S50 the procedure returns to step S41.
- the position of the unauthorized intruder 3 in the three-dimensional coordinate system is repeatedly detected, and in cases where the unauthorized intruder 3 is present inside the external security surface 22, the processing of steps S47 through S50 is repeated on the basis of the position of the unauthorized intruder 3 in the three-dimensional coordinate system.
- Fig. 12 is a flow chart showing the details of caretaker guard processing, corresponding to the processing of step S10 in Fig. 7.
- step S71 and the processing of step S72 are respectively similar to the processing of step S41 and the processing of step S42 in Fig. 12; accordingly, a description of these steps is omitted.
- step S73 a judgment is made as to whether or not there are differences between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory for the control localizer 11 and fixed localizers 12 inside the external security surface 22.
- the inter-localizer distance matrix that is stored in memory is updated to values indicating the distances between the localizers at that point in time (the point in time at which non-guard processing is executed). Accordingly, in step S73, the differences between the last updated inter-localizer distance matrix and the current inter-localizer distance matrix are detected. These differences are calculated as the sum of the absolute values of the differences for each corresponding element in the range in which distance measurement is possible within the inter-localizer distance matrix that is stored in memory and the inter-localizer distance matrix at the current point in time.
- the control unit 41 judges that there is an abnormality (i. e., "abnormality present") if the abovementioned sum exceeds a predetermined threshold value. If the fixed localizers 12 are mounted on the window 4, door 5 or safe 6 as shown in Fig. 1, then the distances between the localizers mounted on the window 4 and door 5 and other localizers will vary if the window 4 moves (is opened), or if the door 5 moves (is opened). The same is true if the safe 6 moves. As a result, the inter-localizer distance matrix varies.
- step S73 In cases where it is judged in step S73 that there are no differences between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory for the control localizer 11 and fixed localizers 12 that are inside the external security surface 22, the processing proceeds to step S74, and the control localizer 11 and fixed localizers 12 analyze the waveform of the wireless signals communicating with the inside of the external security surface 22 by processing similar to the processing of step S44.
- step S75 the control unit 41 of the control localizer 11 judges whether or not a human body is present between the control localizer 11 and fixed localizers 12 or between the respective fixed localizers 12 inside the external security surface 22 on the basis of the human body detection information that is transmitted from the respective fixed localizers 12, or the results of human body detection by the control localizer 11 itself.
- step S75 In cases where it is judged in step S75 that no human being is present between the control localizer 11 and fixed localizers 12 or between the respective fixed localizers 12 on the inside of the external security surface 22, the processing proceeds to step S76, and the control unit 41 of the control localizer 11 judges whether or not other guard processing has been executed.
- step S76 In cases where it is judged in step S76 that no other guard processing has been executed, the processing returns to step S71, and the abovementioned processing is repeated.
- step S76 In cases where it is judged in step S76 that other guard processing has been executed, the at-home guard processing is ended.
- step S73 In cases where it is judged in step S73 that there are differences between the inter-localizer distance matrix that is produced and the inter-localizer distance matrix that is stored in memory for the control localizer 11 and fixed localizers 12 inside the external security surface 22, or in cases where it is judged in step S75 that a human being is present between the control localizer 11 and fixed localizers 12 or between the respective fixed localizers 12 inside the external security surface 22, this means that there has been an unauthorized intrusion; accordingly, the procedure proceeds to step S77.
- steps S77 through S79 is similar to the processing of steps S47 through S49 in Fig. 12; accordingly, a description of this processing will be omitted.
- step S80 the procedure returns to step S71.
- the position of the unauthorized intruder 3 in the three-dimensional coordinate system is repeatedly detected, and in cases where an unauthorized intruder 3 is present inside the external security surface 22, the processing of steps S77 through S79 is repeated on the basis of the position of the unauthorized intruder 3 in the three-dimensional coordinate system.
- Fig. 14 is a diagram which illustrates the emission of white smoke.
- the security system comprises a control localizer 11, fixed localizers 12-1 through 12-18, and a mobile localizer 13.
- the control localizer 11, fixed localizers 12-1 through 12-18 and mobile localizer 13 are disposed in various locations in the rooms 201-1 through 201-3 of a home 1, and on the outside of this home 1.
- the fixed localizer 12-4 is attached to a window 4-1.
- the fixed localizer 12-8 is attached to a window 4-2.
- the fixed localizer 12-16 is attached to a window 4-3.
- the fixed localizer 12-6 is attached to a door 5-1.
- the fixed localizers 12-1 and 12-7 are attached to a door 5-2.
- the fixed localizer 12-11 is attached to a door 5-3.
- the fixed localizers 12-12 and 12-13 are attached to a door 5-4.
- an unauthorized intruder 3 intrudes from the window 4-1 of the room 201-1, an unauthorized intruder 3 is considered to be present in the vicinity of the fixed localizer 12-4 whose position in the three-dimensional coordinate system moves as a result of the opening of the window 4-1, and the fixed localizer 12-4 attached to this window generates a warning sound and emits a stream of white smoke.
- White smoke is also emitted from the fixed localizers 12-3 and 12-7 located near the fixed localizer 12-4 that is attached to the window 4-1 of the room 201-1.
- the fixed localizers 12-15 and 12-16 which are positioned near the mobile localizers 13 and positioned in a direction away from the position of the unauthorized intruder 3 provide evacuation guidance to the authorized members (on which the mobile localizers 13 positioned inside the internal security surface 21 are mounted) in a direction away from the position of the unauthorized intruder 3 by outputting a sound.
- a control localizer 11 is disposed in an arbitrary location in the interior of a vehicle 7 (other than the doors 301-1 through 301-4).
- One or more fixed localizers 12 are disposed on the insides of the respective doors 301-1 through 301-4.
- a fixed localizer 12-1 is disposed on the inside of the door 301-1
- a fixed localizer 12-2 is disposed on the inside of the door 301-2
- a fixed localizer 12-3 is disposed on the inside of the door 301-3
- a fixed localizer 12-4 is disposed on the inside of the door 301-4.
- the setting of a three-dimensional coordinate system, the setting of the positions of all of the fixed localizers in this three-dimensional coordinate system and the setting of an external security surface 22 are performed by processing similar to that described above.
- the car security system executes processing of the execution mode.
- the processing of this execution mode is similar to the processing that was described with reference to Fig. 7. Since no internal security surface 21 is set, at-home guard processing is not started (executed). Accordingly, in this car security system, only two types of guard processing, i. e., caretaker guard processing and non-guard processing, are executed. Such caretaker guard processing and non-guard processing are respectively similar to the processing that was described with reference to Fig. 13 and the processing that was described with reference to Fig. 11.
- the fixed localizers 12 In the case of caretaker guard processing, if the fixed localizers 12 contain speakers 78 (used to generate a warning sound) as actuators, and also contain white smoke generating modules, then the fixed localizers 12 will emit a warning sound and will also emit a stream of white smoke throughout the interior of the vehicle when any of the doors 301-1 through 301-4 are opened.
- unauthorized intruders can be repulsed by the operation of the actuators in response to the positions of the unauthorized intruders.
- unauthorized intruders can be prevented from approaching authorized members who are present with a [given] region, and authorized members located within this region can be given evacuation guidance while these members avoid such unauthorized intruders.
- security surfaces whose setting is required for the automatic switching between guard processing and non-guard processing can be simply set and registered using mobile localizers 13.
- the execution means that execute processing can be selected in accordance with the relationship between the detected positions of the authorized members and the detected positions of unauthorized intrusions, and the execution of processing by the selected execution means is controlled, specified processing with respect to unauthorized intrusions can be executed in accordance with conditions in the object of security without any need for a bothersome operation.
- first guard processing or second guard processing is controlled so that first guard processing is executed on the basis of the detected positions of the authorized members in cases where there are no authorized members inside the external security surface, and so that second guard processing is executed in cases where there are authorized members inside the internal security surface, and processing with respect to unauthorized intrusions is executed when the position of an unauthorized intrusion into the object of security is detected in cases where first guard processing or second guard processing is executed, specified processing with respect to unauthorized intrusions can be executed in accordance with conditions in the object of security without any need for a bothersome operation.
- a vehicle security system is constructed from fixed terminal devices which are disposed on the inside surfaces of the respective doors of a vehicle, and which measure the distances from these terminal devices to other terminal devices and a control terminal device
- a mobile terminal device held by a person have the proper authorization to enter and exit this vehicle, and a control terminal device which is disposed inside the vehicle
- this system is devised so that variations in the distances between fixed terminal devices and a control terminal device and the distances between respective terminal devices disposed inside the vehicle are monitored in cases where the position of the mobile terminal device is outside an external security surface set by fixed terminal devices and a control terminal device disposed inside the vehicle, it is judged that an abnormality has occurred in cases where the variation in distances satisfies specified conditions, and specified processing with respect to unauthorized intrusions is executed in cases where it is judged that an abnormality has occurred, unauthorized intrusions can be detected, and specified processing with respect to unauthorized intrusions can be executed.
- the first axis of the three-dimensional coordinate system is specified by applying a specified mathematical operation to first measurement results that indicate the distance between the first terminal device and second terminal device, the distance between the first terminal device and third terminal device and the distance between the second terminal device and third terminal device
- the second axis of the three-dimensional coordinate system is specified by applying a specified mathematical operation to the first measurement results, the distance between the first terminal device and fourth terminal device, the distance between the second terminal device and fourth terminal device and the distance between the third terminal device and fourth terminal device are respectively measured
- the third axis of the three-dimensional coordinate system is specified from second measurement results indicating the distance between the first terminal device and fourth terminal device, the distance between the second terminal device and fourth terminal device and
- the first invention makes it possible to detect unauthorized intrusions. Furthermore, by using the first invention, it is possible to execute specified processing with respect to unauthorized intrusions in accordance with conditions in the object of security without any need for a bothersome operation.
- the second invention makes it possible to detect unauthorized intrusions. Furthermore, by using the second invention, it is possible to execute specified processing with respect to unauthorized intrusions in accordance with conditions in the object of security without any need for a bothersome operation.
- the third invention makes it possible to detect unauthorized intrusions. By using the third invention, it is possible to detect unauthorized intrusions and to execute specified processing with respect to unauthorized intrusions.
- the fourth invention makes it possible to detect unauthorized intrusions. By using the fourth invention, it is possible to detect unauthorized intrusions and to execute specified processing with respect to unauthorized intrusions.
- the fifth invention makes it possible to detect unauthorized intrusions.
- the fifth invention it is possible to detect unauthorized intrusions and to execute specified processing with respect to unauthorized intrusions.
- the sixth invention makes it possible to detect unauthorized intrusions. By using the sixth invention, it is possible to detect unauthorized intrusions and to execute specified processing with respect to unauthorized intrusions.
- the seventh invention makes it possible to detect unauthorized intrusions.
- the seventh invention it is possible to detect unauthorized intrusions and to execute specified processing with respect to unauthorized intrusions.
- the eighth invention makes it possible to execute area setting for the setting and release of guard modes in a simple manner.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
According to the present invention, specified processing
for unauthorized intrusions can be executed in accordance with
conditions in the object of security without requiring any
bothersome operation. The distance measuring unit 43 detects
the positions of authorized members using the object of
security. The wireless transmitting and receiving unit 44 and
data communications unit 46 detect the positions of
unauthorized intrusions into the object of security. The
white smoke generating modules 49 are disposed in a plurality
of locations inside the object of security, and execute
processing with respect to unauthorized intrusions. The
control unit 41 selects the white smoke generating module 49
that executes processing in accordance with the relationship
between the detected positions of the authorized members and
the detected position of the unauthorized intrusion, and
controls the execution of processing by the selected white
smoke generating module 49. The present invention can be
applied to a home security system.
Description
The present invention relates to a security system, a
terminal device, an information processing device and method,
a program, a vehicle security system, a network system and a
setting method, and more particularly relates to a security
system, a terminal device, an information processing device
and method, a program, a vehicle security system and a setting
method which detect the unauthorized invasion of an object
constituting the object of security.
Various types of security systems have been proposed and
utilized in the past.
In Japanese Patent Application Laid-Open No. 10-27292, a
system is disclosed which is devised so that the final person
to leave when a facility such as a shop or the like is closed
can open a final exit door and return home only after doors
that are the object of security are locked and a security mode
is set. In this system, the system is devised so that during
ordinary business hours up to five o'clock in the evening, the
final exit door can be freely opened from the inside, while
after five o'clock in the evening, the setting of the security
mode is a condition for the opening of the door. As a result,
the possibility that the setting of the security mode that
notifies the security firm of the breaking of the door will be
forgotten is prevented in advance.
In Japanese Patent Application Laid-Open No. 8-249550, a
system is disclosed which is devised so that a monitoring mode
is successively varied in loop form by pressing one setting
button of a home security device for a time that is less than
a first specified time within a second specified time. The
monitoring mode is checked after the second specified time has
elapsed, and the crime-prevention sensors of a plurality of
systems are set in a monitoring state. In cases where the
abovementioned setting button is pressed for a time that
exceeds the first specified time, the monitoring state of the
crime-prevention sensors of the plurality of systems is
released by the operation of one setting button. In this home
security device, the setting/release of the monitoring state
of the closing of doors can be accomplished by the operation
of a single setting button even in cases where the crime-prevention
sensors of a plurality of systems are connected.
In Japanese Patent Application Laid-Open No. 2001-56887,
a system is disclosed in which a first sensor that has a
detection area on the object of security and on the front
surface side of a part above the object of security, and a
second sensor that has a detection area on the object of
security and on the front surface side of a part below the
object of security, are provided, a logic circuit equipped
with a timer is disposed on at least one of the sensors, i. e.,
the first sensor or second sensor, and an output path that
outputs a detection signal from the detection part within the
sensor to the outside is disposed on at least the other sensor.
The logic circuit equipped with a timer generates a warning
signal when a detection signal from the detection part within
the sensor on which the timer-equipped logic circuit is
disposed and a detection signal that is extracted via the
output path of the other sensor are received within a
specified time. As a result, erroneous reports caused by
small animals or external disturbing light can be avoided, and
intrusion via openings such as (e. g.) windows, entrances and
exits and the like of the building that is the object of
security can be properly detected.
In Japanese Patent Application Laid-Open No. 5-114091, a
system is disclosed which is devised so that when a window is
opened so that the sensing signal of an indoor invasion sensor
is input into a data processing part, a judgment is made as to
whether or not a sensing signal indicating that an outdoor
invasion sensor that monitors a specified position outside the
window has sensed an intruder has been input into the data
processing part in the past few seconds, and if conditions
described previously are satisfied as a result of this
judgment, an internal notification is made by means of a voice
sounding action using an internal notification part and a
speaker, and a higher system notification is made using a
terminal that connects a higher system notification part and a
telephone circuit, so that an actual warning is issued, while
if the [abovementioned] conditions are not satisfied, this
event is handled as an erroneous warning, and no internal
notification or higher system notification is made. As a
result, the warning can be judged to be an actual warning, and
an intrusion warning can be issued, only when the
[abovementioned] window is opened from the outside.
However, in the case of conventional home security
systems, changing the mode of the home security system is
bothersome, and mode change mistakes lead to erroneous
warnings, failure to detect intrusions and the like.
In the invention disclosed in Japanese Patent Application
Laid-Open No. 10-27292, the complicated operation of "the
final person to leave being able to open the final exit door
and return home only after locking the doors that are the
object of security and setting the security mode" is required
in order to solve the setting of the task of eliminating
mistakes in the changing of the mode settings, so that the
system is inconvenient. In the invention disclosed in
Japanese Patent Application Laid-Open No. 8-249550, a button
operation is required in order to change the mode settings,
and if [the operator] forgets to perform this button operation,
the mode settings cannot be changed. Furthermore, even if an
intruder is detected, only a simple voice warning is issued;
accordingly, the intruder cannot be effectively repulsed.
The present applicant has analyzed the abovementioned
problems; here, the "problem points" that are the causes of
the problems will be indicated.
The following description will center on the home;
however, this description may be applied to facilities
(objects of security) such as homes, warehouses, offices,
factories, hospitals, schools, vehicles and the like.
The following items are required in order to eliminate
erroneous warnings with respect to intruder warnings in home
security systems.
First, if the movement of a person inside the home or the
opening or closing of a door of the home is detected during
the absence of the person dwelling in the home, "caretaker
guard processing" that judges whether or not an unauthorized
intruder is present in this case must be started and stopped
with an appropriate timing.
Second, in cases where a door or window of the home is
opened or closed when the home dweller is present in a
specified place inside the home, "at-home guard processing"
that judges whether or not an unauthorized intruder is present
must be appropriately started and stopped.
Third, the intruder must be repulsed with an appropriate
timing and at an appropriate place.
The present invention was devised in light of the above
facts; a first object of the present invention is to lower
the frequency of erroneous warnings by setting and releasing
the warning mode automatically without requiring the operation
of a button or the like. Specifically, the present invention
is devised so that specified processing with respect to
unauthorized intrusions can be executed in accordance with the
conditions inside the object of security without requiring any
bothersome operation.
A second object of the present invention is to allow the
simple execution of area settings for the purpose of setting
and releasing the warning mode, i. e., to allow simple initial
settings.
A third object of the present invention is to allow
effective repulsion of intruders.
A fourth object of the present invention is to make it
possible to provide appropriate evacuation guidance to
authorized members.
The first security system of the present invention is
characterized in that this security system comprises member
position detection means that detect the positions of
authorized members using the object of security, unauthorized
intrusion position detection means that detect the positions
of unauthorized intrusions into the object of security,
execution means that are disposed in a plurality of locations
inside the object of security, and that execute processing
with respect to unauthorized intrusions, and execution control
means that select the execution means that execute processing
in accordance with the relationship between the positions of
authorized members detected by the member position detection
means and the positions of unauthorized intrusions detected
by the unauthorized intrusion position detection means, and
that control the execution of the processing of the selected
execution means.
The execution control means can be devised so that in
cases where the distance between the position of an
unauthorized intrusion and the position of an authorized
member is equal to or less than a specified threshold value,
one or more execution means including the execution means
closest to the position of the unauthorized intrusion are
selected, and the execution of processing is controlled so
that the processing for the unauthorized intrusion is executed
by the selected execution means.
The execution control means can be devised so that the
execution of processing is performed in such a manner that
processing for the evacuation guidance of the authorized
member is executed by execution means whose distance from the
position of the authorized member is equal to or less than a
specified threshold value, and which are located furthest from
the position of the unauthorized intrusion.
The execution means can be devised so that these
execution means execute processing that generates white smoke.
The member position detection means can be devised so
that these member position detection means detect the
positions of authorized members by detecting the positions of
devices which are mounted on the authorized members, and which
transmit by wireless transmission an ID code that corresponds
to the object of security.
The member position detection means can be devised so
that these member position detection means detect the
positions of authorized members by detecting the positions of
devices which are mounted on the authorized members, which
transmit by wireless transmission an ID code that corresponds
to the object of security, and in which the execution means
are disposed.
The second security system of the present invention is
characterized in that this security system comprises member
position detection means that detect the positions of
authorized members using the object of security, unauthorized
intrusion position detection means that detect the positions
of unauthorized intrusions into the object of security,
external security surface memory means that store the position
of an external security surface, internal security surface
memory means that store the position of an internal security
surface, execution control means that control the execution of
first guard processing or second guard processing on the basis
of the positions of authorized members detected by the member
position detection means so that the first guard processing is
executed in cases where no authorized member is present inside
the external security surface, and so that the second guard
processing is executed in cases where an authorized member is
present inside the internal security surface, and execution
means which are disposed in a plurality of locations inside
the object of security, and which execute processing for
unauthorized intrusions when the positions of unauthorized
intrusions into the object of security are detected by the
unauthorized intrusion position detection means in cases where
the first guard processing or second guard processing is
executed.
The first guard processing can be set as caretaker guard
processing that is guard processing for unauthorized
intrusions into the inside of the external security surface,
and the second guard processing can be set as at-home guard
processing that is guard processing for unauthorized
intrusions into the space between the external security
surface and internal security surface.
The execution means can be devised so that these
execution means execute processing that generates white smoke.
The member position detection means can be devised so
that these means detect the positions of authorized members by
detecting the positions of devices which are mount on the
authorized members, and which transmit by wireless
transmission ID codes that correspond to the object of
security.
The member position detection means can be devised so
that these means detect the positions of authorized members by
detecting the positions of devices which are mounted on the
authorized members, which transmit by wireless transmission an
ID code that corresponds to the object of security, and in
which the execution means are disposed.
The execution means disposed in the devices can be
devised so that these means execute processing that generates
white smoke.
The terminal device of the present invention is
characterized in that this terminal device comprises an
antenna unit, a wireless transmitting and receiving unit that
transmits and receives information via the antenna unit, a
distance measuring unit that measures the distance to the
device constituting the wireless transmitting and receiving
partner by transmitting and receiving signals modulated by a
specified code via the antenna unit and wireless transmitting
and receiving unit, a data communications unit which performs
data communications with the devices by transmitting and
receiving signals modulated by a code via the antenna unit and
wireless transmitting and receiving unit, an actuator which
executes specified processing with respect to unauthorized
intrusions, and a control unit which performs overall control.
The actuator can be devised so that this actuator
executes processing that generates white smoke.
The terminal device can be further equipped with human
body detection means that detect a human body between the
terminal device and another terminal device by analyzing the
waveform of a wireless communications signal between the
terminal device and another terminal device, and the actuator
can be devised so that the actuator executes processing for an
unauthorized intrusion in cases where the human body detection
means detect a human body.
The second terminal device of the present invention is
characterized in that this terminal device comprises distance
measuring means that measure the distance between this second
terminal device and a partner [terminal device], human body
detection means that detect a human body between this second
terminal device and this partner [terminal device], and
transmitting means that transmit information indicating the
measured distance between this second terminal device and
partner [terminal device] or information indicating the
detection of a human body.
The first information processing method of the present
invention comprises a distance measurement step in which the
distance between the terminal device and partner [terminal
device] is measured, a human body detection step in which a
human body between the terminal device and the partner
[terminal device] is detected by the waveform analysis of a
wireless communications signal, and a transmission control
step in which the transmission of information indicating the
measured distance between the terminal device and partner
[terminal device] or information indicating the detection of a
human body is controlled.
The first program of the present invention is
characterized in that this program causes a computer to
execute a distance measurement step in which the distance
between the terminal device and partner [terminal device] is
measured, a human body detection step in which a human body
between the terminal device and the partner [terminal device]
is detected by the waveform analysis of a wireless
communications signal, and a transmission control step in
which the transmission of information indicating the measured
distance between the terminal device and partner [terminal
device] or information indicating the detection of a human
body is controlled.
The information processing device of the present
invention is characterized in that this device comprises
distance measuring means that measured the distances to
respective terminal devices from this information processing
device, receiving means for receiving information indicating
the distances between terminal devices, which is transmitted
from the respective terminal devices, and judgment means for
judging whether or not there has been an unauthorized
intrusion into the object of security on the basis of the
distances to the respective terminal devices from the
information processing device or the distances between the
respective terminal devices.
The information processing device can be further equipped
with human body detection means that detect a human body
between the information processing device and respective
terminal devices by waveform analysis of a wireless
communications signal, and the judgment means can be devised
so that these means judge whether or not there has been an
unauthorized intrusion into the object of security on the
basis of the detection of a human body.
The receiving means can further receive information
indicating the detection of a human body that is transmitted
from the respective terminal devices, and the judgment means
can be devised so that these means judge whether or not there
has been an unauthorized intrusion into the object of security
on the basis of information indicating the detection of a
human body.
The second information processing method of the present
invention is characterized in that this method comprises a
distance measurement step in which the distances from the
[information processing device] to respective terminal devices
are measured, a reception control step in which the reception
of information indicating the distances between terminal
devices (which is transmitted from the respective terminal
devices) is controlled, and a judgment step in which a
judgment is made as to whether or not there has been an
intrusion into the object of security on the basis of the
distances from the information processing device to the
respective terminal devices or the distances between the
terminal devices.
The second program of the present invention is
characterized in that this program causes a computer to
execute a distance measurement step in which the distances
from the [information processing device] to respective
terminal devices are measured, a reception control step in
which the reception of information indicating the distances
between terminal devices (which is transmitted from the
respective terminal devices) is controlled, and a judgment
step in which a judgment is made as to whether or not there
has been an intrusion into the object of security on the basis
of the distances from the information processing device to the
respective terminal devices or the distances between the
terminal devices.
The vehicle security system of the present invention
comprises fixed terminal devices which are disposed on the
inside surfaces of the respective doors of the vehicle and
which measure the distances between other fixed terminal
devices and a control terminal device, a mobile terminal
device which is held by a person that has proper authorization
to enter and exit the vehicle, and a control terminal device
which is disposed inside the vehicle, and is characterized in
that the variations in the distance between the fixed terminal
devices disposed inside the vehicle and the control terminal
device and the mutual distances between the fixed terminal
devices are monitored when the position of the mobile terminal
device is located outside an external security surface that is
set by the fixed terminal devices disposed inside the vehicle
and the control terminal device, it is judged that an
abnormality has occurred in cases where the variation in
distance satisfies specified conditions, and processing for
unauthorized intrusions is executed in cases where it is
judged that an abnormality has occurred.
The processing for unauthorized intrusions can be devised
so that white smoke is generated in this processing.
The network system of the present invention comprises
sensing means in which fixed nodes sense the surrounding
environment, first wireless communications means, an actuator
which applies an action to the outside, and control means
which control the first wireless communications means so that
information relating to the surrounding environment sensed by
the sensing means is transmitted to a control node, and so
that the actuator is caused to operate in accordance with
commands from the control node, and is characterized in that
the control node comprises second wireless communications
means and selection means that select the fixed node for which
the actuator is to be operated on the basis of information
relating to the surrounding environment that is received from
the fixed nodes, and the second wireless communications means
transmits a command that operates the actuator to the selected
fixed node.
The second wireless communications means can be devised
so that these means receive information relating to the
surrounding environment (constituting information relating to
the distances between fixed nodes) that is transmitted from
the fixed nodes.
The first setting method of the present invention is a
setting method for a three-dimensional coordinate system using
a first terminal device, second terminal device, third
terminal device and fourth terminal device which are terminal
devices comprising an antenna unit, a wireless transmitting
and receiving unit that transmits and receives information via
the antenna unit, a distance measuring unit that measures the
distance to the device constituting the wireless transmitting
and receiving partner by transmitting and receiving signals
modulated by a specified code via the antenna unit and
wireless transmitting and receiving unit, a data
communications unit which performs data communications with
the devices by transmitting and receiving signals modulated by
a code via the antenna unit and wireless transmitting and
receiving unit, an actuator which executes specified
processing with respect to unauthorized intrusions, and a
control unit which performs overall control, this setting
method being characterized in that the position of the first
terminal device is taken as the origin of the three-dimensional
coordinate system, the distance between the first
terminal device and second terminal device, the distance
between the first terminal device and third terminal device
and the distance between the second terminal device and third
terminal device are respectively measured, the first axis of
the three-dimensional coordinate system is specified by
applying a specified mathematical operation to first
measurement results indicating the distance between the first
terminal device and second terminal device, the distance
between the first terminal device and third terminal device
and the distance between the second terminal device and third
terminal device, the second axis of the three-dimensional
coordinate system is specified by applying a specified
mathematical operation to these first measurement results, the
distance between the first terminal device and fourth terminal
device, the distance between the second terminal device and
fourth terminal device and the distance between the third
terminal device and fourth terminal device are respectively
measured, and the third axis of the three-dimensional
coordinate system is specified from second measurement results
indicating the distance between the first terminal device and
fourth terminal device, the distance between the second
terminal device and fourth terminal device and the distance
between the third terminal device and fourth terminal device,
the first axis and the second axis.
The second setting method of the present invention is the
security surface setting method in the three-dimensional
coordinate system set by the setting method according to claim
28, characterized in that the position of a fifth terminal
device constituting a terminal device in the three-dimensional
coordinate system is detected, the smallest rectangular solid
in the three-dimensional coordinate system including a
plurality of detected positions is determined, and the
security surface is set on the basis of surface of the
determined rectangular solid.
The system of the present invention relates to a security
system using a sensor network constructed from nodes in which
a plurality of nodes that can generate node ID information and
that allow the measurement of the distances between nodes and
the detection of any intrusion between nodes are disposed in
facilities such as (for example) homes, warehouses, offices,
factories, hospitals, schools, vehicles or the like, and nodes
are also held by authorized members of these facilities, and
further relates to a security system using an actuator network
in which the nodes are equipped with actuators, and these
actuators are appropriately operated in accordance with the
position of an unauthorized intruder.
In the first security system of the present invention,
the positions of authorized members using the object of
security are detected, the position of any unauthorized
intrusion into the object of security is detected, processing
with respect to unauthorized intrusions is executed by
execution means disposed in a plurality of locations inside
the object of security, execution means that execute
processing are selected in accordance with the relationship
between the detected positions of authorized members and the
detected position of any unauthorized intrusion, and the
execution of the processing of the selected execution means is
controlled.
In the second security system of the present invention,
the positions of authorized members using the object of
security are detected, the position of any unauthorized
intrusion into the object of security is detected, the
position of an external security surface is stored in memory,
the position of an internal security surface is stored in
memory, the execution of first guard processing or second
guard processing is controlled on the basis of the detected
positions of authorized members so that first guard processing
is executed in cases where no authorized member is present
inside the external security surface, and so that second guard
processing is executed in cases where an authorized member is
present inside the internal security surface; furthermore, in
cases where first guard processing or second guard processing
is executed, processing for an unauthorized intrusion is
executed when the position of an unauthorized intrusion into
the object of security is detected.
In the first terminal device of the present invention,
information is transmitted and received via the antenna unit,
signals modulated by a specified code are transmitted and
received via the antenna unit and wireless transmitting and
receiving unit, so that the distance to the device
constituting the wireless transmitting and receiving partner
is measured, data communications with devices are performed by
transmitting and receiving signals modulated by a specified
code via the antenna unit and wireless transmitting and
receiving unit, specified processing for unauthorized
intrusions is executed, and the device as a whole is
controlled.
In the second terminal device, first information
processing method and first program of the present invention,
the distance to the partner [terminal device] is measured, a
human body between this second terminal device and the partner
[terminal device] is detected by the waveform analysis of a
wireless communications signal, and information indicating the
measured distance to the partner [terminal device] or
information indicating the detection of a human body is
transmitted.
In the information processing device, second information
processing method and second program of the present invention,
the distances to respective terminal devices from the
information processing device are measured, information
indicating the distances between terminal devices that is
transmitted from the respective terminal devices is received,
and a judgment as to whether or not there has been an
unauthorized intrusion into the object of security is made on
the basis of the distances from the information processing
device to the respective terminal devices or the distances
between terminal devices.
In the vehicle security system of the present invention,
in cases where the position of the mobile terminal device is
outside the external security surface that is set by the
control terminal device and the fixed terminal devices that
are disposed inside the vehicle, the variations in the
distances between the control terminal device and the fixed
terminal devices disposed inside the vehicle and the distances
between the fixed terminal devices are monitored; furthermore,
in cases where the variation in the distance satisfies
specified conditions, it is judged that an abnormality has
occurred, and in cases where it is occurred that an
abnormality has occurred, specified processing for an
unauthorized intrusion is executed.
In the network system of the present invention, the
surrounding environment is sensed, an action is applied to the
outside, and information relating to the sensed surrounding
environment is transmitted to the control node; furthermore,
a control action is performed so that the actuator is operated
in accordance with commands from the control node, the fixed
node for which the actuator is to be operated is selected on
the basis of the information relating to the surrounding
environment that is received from the fixed nodes, and the
actuator is caused to operate on the selected fixed node.
In the first setting method of the present invention, the
position of the first terminal device is taken as the origin
of the three-dimensional coordinate system, the distance
between the first terminal device and second terminal device,
the distance between the first terminal device and third
terminal device and the distance between the second terminal
device and third terminal device are respectively measured,
the first axis of the three-dimensional coordinate system is
specified by applying a specified mathematical operation to
first measurement results indicating the distance between the
first terminal device and second terminal device, the distance
between the first terminal device and third terminal device
and the distance between the second terminal device and third
terminal device, the second axis of the three-dimensional
coordinate system is specified by applying a specified
mathematical operation to these first measurement results, the
distance between the first terminal device and fourth terminal
device, the distance between the second terminal device and
fourth terminal device and the distance between the third
terminal device and fourth terminal device are respectively
measured, and the third axis of the three-dimensional
coordinate system is specified from second measurement results
indicating the distance between the first terminal device and
fourth terminal device, the distance between the second
terminal device and fourth terminal device and the distance
between the third terminal device and fourth terminal device,
the first axis and the second axis.
Fig. 1 is a diagram which shows one embodiment of the
security system of the present invention. In Fig. 1, the
security system of the present invention is disposed in a home
1 which constitutes one example of the object of security.
Furthermore, in Fig. 1, the user 2-1 and user 2-2 are
authorized members using the home 1. The security system
detects the position of the unauthorized intrusion of an
unauthorized intruder 3, and executes specified processing
with respect to this unauthorized intrusion.
The security system of the present invention comprises a
control localizer 11, fixed localizers 12-1 through 12-8, and
mobile localizers 13-1 and 13-2.
Below, in cases where there is no need to make individual
distinctions among the fixed localizers 12-1 through 12-8,
these localizers will be referred to simply as the fixed
localizers 12. Below, furthermore, in cases where there is no
need to make an individual distinction between the mobile
localizers 13-1 and 13-2, these localizers will be referred to
simply as the mobile localizers 13.
Furthermore, in the security system of the present
invention, it is sufficient if the number of fixed localizers
12 is three or greater, and the number of mobile localizers 13
may be set at an arbitrary number.
Furthermore, in cases where there is no need to make
individual distinctions among the control localizer 11, fixed
localizers 12 and mobile localizers 13, these localizers will
be referred to simply as localizers.
Here, the localizers are one example of terminal devices,
and constitute a network system. Specifically, a specified ID
code can be transmitted by wireless transmission, so that the
distance between a given node and other nodes can be measured
by wireless, or so that the position of a given node itself
can be measured. Furthermore, a node which is devised so that
if an intruding object (unauthorized intruder 3) is present
between a given node and another node, the intrusion of this
intruding object can be detected, and which further has a
function that allows the wireless transmission of information
detected by this node, is called a localizer.
Specifically, such a localizer detects unauthorized
intrusions by means of the variation in the position of the
localizer itself, or detects unauthorized intrusions by
detecting a human body between localizers (i. e., in the
sensing area).
The fixed localizers 12 are fastened to an object that
constitutes the object of security, whose position basically
does not vary (i. e., an object that does not move). The
control localizer 11 is fastened to this object that
constitutes the object of security whose position basically
does not vary (i. e., an object that does not move), so that
the position of the control localizer 11 does not vary.
Furthermore, the control localizer 11 also has the function of
communicating with the outside, and the control function of
summarizing status information regarding all of the localizers
in the system and storing this information in memory.
The control localizer 11 and fixed localizers 12 are
fastened to fixed object in the home 1 such as window glasses,
the vicinity of indoor window frames, the indoor surfaces of
doors, the surfaces of indoor walls or ceilings, outdoor walls
of the home, outdoor columns, gate posts or the like.
Furthermore, the localizers are also fastened to outdoor
vehicles 7, indoor electrical appliances, safes 6 or the like
that are highly likely to be stolen.
However, mobile localizers 13 are mounted on vehicles 7,
for which movement is a prerequisite. Even a mobile localizer
13 may be automatically incorporated as a fixed localizer 12
into a wireless network consisting of fixed localizers 12 if
this mobile localizer 13 is stationary for a specified period
of time or longer.
For example, as is shown in Fig. 1, the control localizer
11 is fastened to the inside of a wall of the home 1. The
fixed localizer 12-1, fixed localizer 12-2 and fixed localizer
12-3 are fastened to the insides of walls of the home 1.
Furthermore, the fixed localizer 12-4 is fastened to the
inside of a door 5 of the home 1. The fixed localizer 12-5 is
fastened to the inside of a window 4 of the home 1. The fixed
localizer 12-6 is fastened to a safe 6.
Furthermore, the fixed localizer 12-7 is fastened to the
external structure of the home 1. Moreover, the fixed
localizer 12-8 (or a mobile localizer 13) is fastened to a
vehicle 7.
The position of the control localizer 11 is taken as the
origin of a coordinate system (three-dimensional coordinate
system) used for position measurement.
Then, three fixed localizers 12 centered on the control
localizer 11 are disposed (for example) in the plus direction
on the X axis, Y axis and Z axis, and a reference coordinate
system (three-dimensional coordinate system) used to measure
the positions of the fixed localizers 12 or mobile localizers
13 in terms of three-dimensional coordinates is set on the
basis of the positions of the control localizer 11 and three
fixed localizers 12.
Subsequently, the other fixed localizers 12 are further
disposed in regions that are the object of monitoring inside
and outside the home 1, and the positions of the fixed
localizers 12 thus disposed in the three-dimensional
coordinate system are registered (stored in memory).
The users 2-1 and 2-2 who are authorized members of the
home 1 such as family members, cohabitants or the like hold
mobile localizers 13 that are capable of transmitting an ID
code by wireless transmission.
The control localizer 11 hypothetically sets an external
security surface 22 on the outside of the home 1 so that this
external security surface surrounds the home 1, and
hypothetically sets one or more internal security surfaces 21
on the inside of the home 1 so that these internal security
surfaces surround designated regions inside the home 1.
Specifically, the internal security surfaces 21 can be
present only on the inside of the external security surface 22.
Caretaker guard processing is automatically executed in
cases where all of the mobile localizers 13 have exited to the
outside of the external security surface 22. At-home guard
processing is automatically executed in cases where all of the
mobile localizers 13 have entered the interiors of the
internal security surfaces 21 from the interior of the
external security surface 22.
Non-guard processing is automatically executed in cases
where one or more mobile localizers 13 are present in the
region between the internal security surfaces 21 and the
external security surface 22.
As will be described later with reference to Fig. 15, in
cases where no internal security surfaces 21 are set, e. g.,
in the case of use in a vehicle 7, caretaker guard processing
is executed when all of the mobile localizers 13 have exited
to the outside of the external security surface 22, and non-guard
processing is executed in all other cases. In such
cases, the external security surface 22 is set with respect to
the vehicle 7.
The setting of the internal security surfaces 21 and
external security surface 22 is performed as follows.
Specifically, after fixed localizers 12 are set inside and
outside the home 1, the control localizer 11 is set in the
external security surface setting mode.
Then, the users 2-1 and 2-2 holding the mobile localizers
13 (or on which the mobile localizers 13 are mounted) move
through the area outside the home 1, and when these users
reach positions that are to be registered as points on the
external security surface 22, the users press the position
registration buttons of the mobile localizers 13. Positions
on the external security surface 22 in the three-dimensional
coordinate system are registered by performing this operation
in a number of positions sufficient to specify the external
security surface 22. Parameters that determine the
rectangular solids used to determine the external security
surface 22 are determined from the positions on the external
security surface 22 in the three-dimensional coordinate system
thus registered.
Next, one or more internal security surfaces 21 are set.
First, the control localizer 11 is set in the internal
security surface setting mode by the operation of the control
localizer 11. Then, the users 2-1 and 2-2 holding the mobile
localizers 13 (or on which the mobile localizers 13 are
mounted) press the position registration button in appropriate
positions while moving in order to set the internal security
surfaces 21, and register a plurality of positions of the
mobile localizer 13 in the three-dimensional coordinate system
when the position registration button is pressed, for each
internal security surface 21 (each closed internal security
region surface). The parameters of the rectangular solids
used to determine the internal security surfaces 21 are
determined from the plurality of points thus registered in the
three-dimensional coordinate system. When all of the internal
security surfaces 21 that are to be set have been set, the
control localizer 11 is set in the execution mode.
As a result, the security system automatically switches
between three types of processing, i. e., caretaker guard
processing, at-home guard processing and non-guard processing,
in accordance with the position of the mobile localizer 13 and
the positional relationship of the internal security surfaces
21 and external security surface 22. In cases where an
actuator (e. g., a speaker or white smoke generating unit) is
contained in the localizers, the localizers that are close to
the position of the unauthorized intruder 3 are caused to
generate a warning sound or caused to generate white smoke
when an unauthorized intrusion is detected in caretaker guard
processing. When the unauthorized intruder 3 moves through
the home, localizers that are nearby are caused to generate a
warning sound or caused to generate white smoke in accordance
with the position of the intruder; accordingly, a plurality
of localizers are caused to generate a warning sound or caused
to generate white smoke so as to follow the unauthorized
intruder 3.
In the case of at-home guard processing, the operation of
the actuators is controlled so that the unauthorized intruder
3 tends not to approach the internal security surfaces 21, or
the actuators are controlled so that the users 2-1 and 2-2
inside the internal security surfaces 21 can escape away from
the unauthorized intruder 3.
A wireless network system which detects abnormalities by
comparing respective distances between nodes (i. e., a
distance matrix) under ordinary circumstances and respective
distances between nodes (i. e., a distance matrix) during
monitoring has been named the "Hagoromo System" by the present
applicant, and an outline of this system is displayed on the
web site shown below. Below, a matrix which has the distances
between nodes as elements will be called a distance matrix.
Internet URL:http://www.hagoromoweb.com/
Internet URL:http://www.hagoromoweb.com/
Furthermore, the Hagoromo System is also described in the
specification of United States Patent No. 10/200,522 (filing
date: July 23, 2002), which was filed with one of the
inventors of the present application as the inventor.
In the present invention, a distance matrix between
localizers (a matrix in which the distance between a localizer
s and a localizer t is taken as the distance (s, t)) is
monitored in a security system constituting a wireless network
system consisting of a control localizer 11 and fixed
localizers 12.
Next, the localizers will be described in greater detail.
Preferably, the localizers contain batteries. The reason
for this is as follows: namely, even if the unauthorized
intruder 3 interrupts the power supply that is supplied to the
home 1 (a so-called AC (alternating current) power supply)
during the intrusion, the localizers can execute specified
processing for the unauthorized intrusion if the localizers
operate by means of an internal power supply. Various types
of batteries such as fuel cells, lithium ion batteries or the
like can be used as batteries in the localizers.
Furthermore, batteries that can be charged may be
disposed in the localizers, and may be used together with an
AC power supply. Moreover, solar batteries may be installed
in localizers that are disposed outdoors. Furthermore, an AC
power supply may be used for indoor localizers. As a result,
the frequency of battery replacement can be reduced, so that
the time and expense required for maintenance can be reduced.
For example, a surface fastener manufactured by Velcro Co.
or Kurare K.K. can be used for the simple mounting of the
localizers on objects (in more concrete terms, the walls of
the home 1, doors, safes, glass or the like).
The technique disclosed in United States Patent No.
5748891 may be used in the localizers. In this technique, the
localizers can measure the distances between localizers, and
can detect variations in the waveforms of wireless signals
transmitted between localizers, which are generated by the
presence of objects between the localizers. The control
localizer 11 uses a communications function between localizers
to gather information that indicates the distances between
these localizers or that indicates whether or not objects are
present in the spaces between the localizers.
Furthermore, the localizers may also be realized by using
the technique disclosed in Japanese Patent Application Laid-Open
No. 2002-228744 or Japanese Patent Application Laid-Open
No. 2000-111638 together with a GPS (global positioning system)
technique and a wireless communications technique.
Specifically, in this case, the distances to objects between
nodes are measured by a radar function, the positions of the
nodes are measured by the function of GPS receivers held on
the nodes, and information relating to the distances to
objects detected between the nodes as well as information
relating to the positions of the nodes is transmitted to other
nodes by a wireless communications function.
Next, the constructions of various types of localizers
will be described with reference to Figs. 2 through 4.
Fig. 2 is a block diagram which shows an example of the
construction of the control localizer 11. For example, the
control unit 41 comprises a built-in type microprocessor (MPU
(micro-processing unit)), and controls and unifies the overall
operation of the control localizer 11 by executing a control
program. The memory 42 comprises a semiconductor memory that
allows reading and writing. For example, this memory 42
stores various types of parameters such as parameters that
specify the external security surface 22, a distance matrix
that indicates the distances between the control localizer 11
and the fixed localizers 12 and the distances between the
fixed localizers 12, and the like. The control unit 41 stores
various types of data (including parameters) in the memory 42,
and reads out data that is stored in the memory 42.
The distance measuring unit 43 transmits pulse sequences
that are used to measure the distances to other localizers to
the wireless transmitting and receiving unit 44 and antenna
unit 45, and receives pulse sequences that are transmitted
from other localizers. The distance measuring unit 43
calculates the distances between the control localizer 11 and
the partner [localizers] from the time difference between the
instant in time at which a pulse sequence is generated by
another partner localizer and the instant in time at which the
control localizer 11 receives a pulse sequence on the basis of
the received pulse sequences that are supplied from the
wireless transmitting and receiving unit 44. The distance
measuring unit 43 supplies information indicating the
distances between the control localizer 11 and the partner
[localizers] to the control unit 41.
The wireless transmitting and receiving unit 44 modulates
a signal supplied from the distance measuring unit 43 or data
communications unit 46 using an ID that specifies the network
system assigned in network system units which is supplied from
an ID code processing unit 47, and transmits signals by
supplying the modulated signal to the antenna unit 45. The
wireless transmitting and receiving unit 44 modulates the
signals received via the antenna unit 45 using the ID
specifying the network system (assigned in network system
units) that is supplied from the ID code processing unit 47.
The wireless transmitting and receiving unit 44 supplies the
modulated signals to the distance measuring unit 43 or data
communications unit 46.
In this way, communication with localizers belonging to
other network systems, i. e., the mixing of signals, is
prevented.
In cases where signals from partners are received, the
antenna unit 45 receives the electromagnetic waves from the
partners, and supplies signals corresponding to the received
electromagnetic waves to the wireless transmitting and
receiving unit 44. Furthermore, in cases where signals are to
be transmitted to partners, the antenna unit 45 radiates
electromagnetic waves on the basis of the signals supplied
from the wireless transmitting and receiving unit 44, and
transmits signals to the partners by wireless transmission.
The data communications unit 46 communicates various
types of data with other localizers via the wireless
transmitting and receiving unit 44 and antenna unit 45 under
the control of the control unit 41.
The ID code processing unit 47 stores an ID that is
peculiar to the control localizer 11 (hereafter called the
localizer ID) and an ID specifying the network system
(hereafter referred to as the network ID) that is assigned in
units of the network system to which the control localizer 11
belongs (for example, a network system in units of one home 1
in cases where the security system is installed as a home
security system). The ID code processing unit 47 supplies the
localizer ID and network ID to the wireless transmitting and
receiving unit 44.
Furthermore, a speaker 48 which generates a warning sound
and a white smoke generating module 49 which generates white
smoke that is used to repulse the unauthorized intruder 3 are
connected to the control unit 41. Moreover, a wireless
notification unit 50 which is used to make a wireless
notification to a communications device belonging to a
specified external party (e. g., the telephone of a security
firm or the mobile phone of the owner of the home) is
connected to the control unit 41.
The input unit 51 comprises a mode changing switch or
operating button, and supplies signals that designate the
settings of the coordinate system, the setting of the external
security surface 22, the settings of the internal security
surface 21, or the selection of the mode such as the execution
mode or the like to the control unit 41 in accordance with
operations performed by the user 2-1 or 2-2. The display unit
52 comprises a liquid crystal display device, organic EL
(electroluminescence) display device or the like, and displays
the results of auto-diagnosis, the residual charges of the
batteries of the respective localizers, the residual amounts
of the white smoke raw material of the white smoke generating
modules and the like (indicated by data received from the
respective localizers) under the control of the control unit
41.
The power supply unit 53 comprises a battery such as a
primary cell or secondary cell, an AC (alternating current)-DC
(direct current) converter or the like, and supplies a power
source to respective parts of the control localizer 11.
Fig. 3 is a block diagram which shows an example of the
construction of the fixed localizers 12. The construction of
the fixed localizers 12 is substantially the same as the
construction of the control localizer 11; however, no
wireless notification unit or display unit is installed in the
fixed localizers 12.
For example, the control unit 71 comprises a built-in
type microprocessor (MPU), and controls and unifies the
overall operation of the fixed localizers 12 by executing a
control program. The memory 72 comprises a semiconductor
memory that allows reading and writing, and stores various
types of parameters that are required for various types of
processing. The control unit 71 stores various types of data
(including parameters) in the memory 72, and reads out data
that is stored in the memory 72.
The distance measuring unit 73 transmits (emits) pulse
sequences that are used to measure the distances to other
localizers to the wireless transmitting and receiving unit 74
and antenna unit 75, and receives pulse sequences that are
transmitted from other localizers. The distance measuring
unit 73 measures the distances between fixed localizers 12 and
partner [localizers] from the time difference between the
instant in time at which a pulse sequence is generated by
another partner localizer and the instant in time at which a
fixed localizer 12 receives a pulse sequence on the basis of
the received pulse sequences that are supplied from the
wireless transmitting and receiving unit 74. The distance
measuring unit 73 supplies information indicating the
distances between fixed localizers 12 and partner [localizers]
to the control unit 71.
The wireless transmitting and receiving unit 74 modulates
a signal supplied from the distance measuring unit 73 or data
communications unit 76 using a network ID which is supplied
from an ID code processing unit 77, and transmits signals by
supplying the modulated signal to the antenna unit 75. The
wireless transmitting and receiving unit 74 demodulates the
signals received via the antenna unit 75 using the network ID
that is supplied from the ID code processing unit 77. The
wireless transmitting and receiving unit 74 supplies the
modulated signals to the distance measuring unit 73 or data
communications unit 76.
In this way, communication with localizers belonging to
other network systems, i. e., the mixing of signals, is
prevented.
In cases where signals from partners are received, the
antenna unit 75 receives the electromagnetic waves from the
partners, and supplies signals corresponding to the received
electromagnetic waves to the wireless transmitting and
receiving unit 74. Furthermore, in cases where signals are to
be transmitted to partners, the antenna unit 75 radiates
electromagnetic waves on the basis of the signals supplied
from the wireless transmitting and receiving unit 74, and
transmits signals to the partners by wireless transmission.
The data communications unit 76 communicates various
types of data with other localizers via the wireless
transmitting and receiving unit 74 and antenna unit 75 under
the control of the control unit 71.
The ID code processing unit 77 stores localizer IDs that
are peculiar to the fixed localizers 12, and a network ID
specifying the network system that is assigned in units of the
network system to which the fixed localizers 12 belong. The
ID code processing unit 77 supplies the localizer IDs and the
network ID to the wireless transmitting and receiving unit 74.
Furthermore, a speaker 78 that generates a warning sound
and a white smoke generating module 79 which generates white
smoke that is used to repulse unauthorized intruders 3 are
connected to the control unit 71.
The operating button 80 supplies signals that are used to
select the mode such as coordinate system setting or the like
to the control unit 71 in accordance with operations performed
by the users 2-1 and 2-2. For example, when the operating
button 80 is pressed, processing that sets the coordinate
system with the control localizer 11 as the origin is executed.
Details of the processing that sets the coordinate system will
be described later.
The power supply unit 81 comprises a battery such as a
primary cell, secondary cell or the like, an AC-DC converter
or the like, and supplies a power source to respective parts
of the fixed localizers 12.
Fig. 4 is a block diagram which shows an example of the
construction of the mobile localizers 13. The construction of
the mobile localizers 13 is substantially similar to the
construction of the fixed localizers 12; however, no white
smoke generating modules are installed in the mobile
localizers 13. The mobile localizers 13 are constructed on
the assumption that the users 2-1 and 2-2 constantly carry
these localizes mounted in the form of a wristwatch or pendant.
For example, the control unit 101 comprises a built-in
type microprocessor (MPU), and controls and unifies the
overall operation of the mobile localizers 13 by executing a
control program. The memory 102 comprises a semiconductor
memory that allows reading and writing, and stores various
types of parameters that are required for various types of
processing. The control unit 101 stores various types of data
(including parameters) in the memory 102, and reads out data
that is stored in the memory 102.
The distance measuring unit 103 transmits (emits) pulse
sequences used to measure distances to other localizers to the
wireless transmitting and receiving unit 104 and antenna unit
105, and receives pulse sequences that are transmitted from
other localizers. The distance measuring unit 103 calculates
the distances between the mobile localizers 13 and partners
from the time difference between the instant in time at which
a pulse sequence is generated by another partner localizer and
the instant in time at which a mobile localizer 13 receives a
pulse sequence on the basis of the received pulse sequences
that are supplied from the wireless transmitting and receiving
unit 104. The distance measuring unit 103 supplies
information indicating the distances between mobile localizers
13 and partner [localizers] to the control unit 101.
The wireless transmitting and receiving unit 104
modulates a signal supplied from the distance measuring unit
103 or data communications unit 106 using a network ID which
is supplied from an ID code processing unit 107, and transmits
signals by supplying the modulated signal to the antenna unit
105. The wireless transmitting and receiving unit 104
modulates the signals received via the antenna unit 105 using
the network ID that is supplied from the ID code processing
unit 107. The wireless transmitting and receiving unit 104
supplies the modulated signals to the distance measuring unit
103 or data communications unit 106.
In this way, communication with localizers belonging to
other network systems, i. e., the mixing of signals, is
prevented.
In cases where signals transmitted to partners, the
antenna unit 105 receives the electromagnetic waves from the
partners, and supplies signals corresponding to the received
electromagnetic waves to the wireless transmitting and
receiving unit 104. Furthermore, in cases where signals are
to be received by partners, the antenna unit 105 radiates
electromagnetic waves on the basis of the signals supplied
from the wireless transmitting and receiving unit 104, and
transmits signals to the partners by wireless transmission.
The data communications unit 106 communicates various
types of data with other localizers via the wireless
transmitting and receiving unit 104 and antenna unit 105 under
the control of the control unit 101.
The ID code processing unit 107 stores localizer IDs that
are peculiar to the mobile localizers 13, and a network ID
specifying the network system that is assigned in units of the
network system to which the mobile localizers 13 belong. The
ID code processing unit 107 supplies the localizer IDs and the
network ID to the wireless transmitting and receiving unit 104.
Furthermore, a speaker 108 used to generate a warning
sound is connected to the control unit 101.
The operating button 109 supplies signals that are used
to select the mode to the control unit 101 in accordance with
operations performed by the users 2-1 and 2-2.
The power supply unit 110 comprises a battery or the like,
and supplies a power source to various parts of the mobile
localizers 13.
Next, the setting of the three-dimensional coordinate
system in the security system of the present invention used as
a network system will be described.
When the input unit 51 is operated by the user 2-1 or 2-2
(constituting the operator), the mode of the control localizer
11 shifts to the coordinate system setting mode. Then, the
operator selects a fixed localizer 12-1 among the fixed
localizers 12 that are already attached, and presses the
operating button 80 of this fixed localizer 12-1.
Consequently, the control localizer 11 and fixed
localizer 12-1 measure the distance between the two localizers,
and the control localizer 11 sets the fixed localizer 12-1 in
a one-dimensional coordinate system (with the X axis as the
positive direction) using the control localizer 11 as the
origin.
Next, the operator selects the fixed localizer 12-2 which
is on the same plane as the control localizer 11 and fixed
localizer 12-1, and presses the operating button 80 that is
disposed on this fixed localizer 12-2. As a result, the
control localizer 11 and fixed localizer 12-1 measure the
respective distances to the fixed localizer 12-2. The fixed
localizer 12-1 transmits information indicating the distance
from the fixed localizer 12-1 to the fixed localizer 12-2 to
the control localizer 11.
Here, the distance between the control localizer 11 and
fixed localizer 12-1 is expressed as the distance a, and the
distance between the control localizer 11 and the fixed
localizer 12-2 is expressed as the distance b. Furthermore,
the distance between the fixed localizer 12-1 and fixed
localizer 12-2 is expressed as the distance c.
As is shown in Fig. 5, Equations (1) and (2) hold true
for the position (x2, y2) of the fixed localizer 12-2 in the
two-dimensional coordinate system.
x2=(c2 -b2 -a2 )/2a
y2=(b2 -x22 )1/2
In this coordinate system, the control localizer 11 is
present at the origin, so that the position of the control
localizer 11 in the three-dimensional coordinate system is (0,
0, 0). The position of the fixed localizer 12-1 in the three-dimensional
coordinate system is (a, 0, 0). Furthermore, the
position of the fixed localizer 12-2 in the three-dimensional
coordinate system is (x2, y2, 0).
Next, as is shown in Fig. 1, the operator selects the
fixed localizer 12-3 which is not on the plane formed by the
control localizer 11, fixed localizer 12-1 and fixed localizer
12-2 (i. e., which is in a position that is removed from this
plane), and presses the operating button 80 that is disposed
on this fixed localizer 12-3.
After the three-dimensional coordinates determined by the
positions of the control localizer 11, fixed localizer 12-1
and fixed localizer 12-2 have been set, the distance between
the control localizer 11 and the fixed localizer 12-3, the
distance between the fixed localizer 12-1 and the fixed
localizer 12-3 and the distance between the fixed localizer
12-2 and the fixed localizer 12-3 are measured by this
operation. The fixed localizers 12-1 through 12-3 transmit
information indicating the distance between the control
localizer 11 and the fixed localizer 12-3, the distance
between the fixed localizer 12-1 and the fixed localizer 12-3
and the distance between the fixed localizer 12-2 and the
fixed localizer 12-3 to the control localizer 11.
On the basis of the received information indicating the
distance between the control localizer 11 and the fixed
localizer 12-3, the distance between the fixed localizer 12-1
and the fixed localizer 12-3 and the distance between the
fixed localizer 12-2 and the fixed localizer 12-3, the control
localizer 11 determines the position (x3, y3, z3) of the fixed
localizer 12-3 in the three-dimensional coordinate system by
solving simultaneous equations with the position of the fixed
localizer 12-3 in the three-dimensional coordinate system as
the unknown quantity.
The control localizer 11 stores information indicating
the positions of the respective fixed localizers 12 in the
three-dimensional coordinate system in association with the
localizer IDs of these fixed localizers 12.
Thus, if the distances to fixed localizers 12 or mobile
localizers 13 focused on three more localizers, i. e., the
control localizer 11 and fixed localizers 12, whose positions
in the three-dimensional coordinate system are known are
determined, the positions of the fixed localizers 12 or mobile
localizers 13 (in the three-dimensional coordinate system) on
which attention is focused can be determined by solving
simultaneous equations.
When a state which is such that the positions of desired
fixed localizers 12 or mobile localizers 13 in the three-dimensional
coordinate system can be determined as described
above is obtained, it can be said that the setting of the
three-dimensional coordinate system is completed.
When the setting of the three-dimensional coordinate
system of the network system has been completed, the
respective fixed localizers 12 within the network system
measure the distances to the fixed localizers 12 whose three-dimensional
coordinates have already been registered, and
measured distance transmission information in the format shown
below, which includes the measured distances, is transmitted
to the control localizer 11.
Here, the localizer IDs can be used as the "own node
number" and "partner node number". Furthermore, in the
network system, for example, node numbers indicating the order
of registration which are assigned at the time of registration
can be used as the "own node number" and "partner node number".
The control localizer 11 stores a distance matrix between
localizers or a list of the position coordinates of localizers
as a fingerprint constituting specific information relating to
the network system consisting of the control localizer 11 and
fixed localizers 12. If the elements of the inter-localizer
distance matrix indicating the distances between localizers s
and localizers t are designated as M(s, t), then M(s, t) can
be expressed by Equation (3).
Here, distance(s, t) is a value that indicates the
distance between a localizer s and a localizer t.
Next, the setting of the external security surface 22 and
internal security surfaces 21 will be described.
First, the setting of the external security surface 22 is
performed.
When the setting of the three-dimensional coordinate
system is completed, the user 2-1 or 2-2 (constituting the
operator) operates the input unit 51 of the control localizer
11, so that the mode of the control localizer 11 is shifted to
the setting mode for the external security surface 22.
Then, while carrying one of the mobile localizers 13, the
operator sets the external security surface 22 as follows:
As a first step, the operator moves the mobile localizer
13 to the presumed vicinity of the external security surface
22. As a second step, the operator presses the operating
button 109 (as a position registration button) of the mobile
localizer 13. Then, as a third step, the fixed localizers 12
respectively measure the distances from themselves to the
mobile localizer 13 in this case, and the measured distances
are transmitted to the control localizer 11 as measured
distance transmission information in the format described
above. The control localizer 11 calculates the position of
the mobile localizer 13 in the three-dimensional coordinate
system on the basis of the distances between the respective
fixed localizers 12 and the mobile localizer 13 contained in
the measured distance transmission information that is
transmitted from the respective fixed localizers 12, and
stores the calculated position of the mobile localizer 13 in
the three-dimensional coordinate system as a registration
point.
The processing of the first step through third step is
repeated until the number of registration points reaches a
specified number, e. g., 10 points. However, the operator
registers the positions in the three-dimensional coordinate
system so that lines connecting the registration points are
present on all of the planes of the envisioned external
security surface 22.
As a fourth step, the control localizer 11 determines the
smallest rectangular solid that surrounds the registered
registration points. Here, the floor surface of this smallest
rectangular solid is set as a plane that is 1 meter lower than
the mean value of the z coordinate positions (positions in the
vertical direction of the three-dimensional coordinate system)
of the respective registration points. The reason for this is
that the positioning of the mobile localizer 13 in the
vicinity of the floor surface or the vicinity of the ceiling
surface is in most cases either difficult to accomplish, or
else requires an unreasonable physical attitude on the part of
the operator.
As a fifth step, the control localizer 11 enlarges the
smallest rectangular solid determined by the processing of the
fourth step by a specified factor (e. g., 150%) about the
center point of this smallest rectangular solid, and registers
(stores in memory) the surface of the enlarged rectangular
solid as the external security surface 22. The reason for
this is as follows: namely, it may be envisioned that there
will be cases in which it is difficult to move around the
outside of the home 1 while holding the mobile localizer 13 in
order to provide registration points outside the home 1;
accordingly, the system is devised so that the external
security surface 22 can be set outside the home 1 by movement
only inside the home 1.
Next, the setting of the internal security surfaces 21 is
performed.
Such internal security surfaces 21 are set in cases where
a warning of intrusions from the outside is to be made even in
cases where authorized members such as the users 2-1, 2-2 and
the like are present inside the home, as in a home security
system. In cases where no authorized member (holder of a
mobile localizer 13) is present between the internal security
surfaces 21 and external security surface 22, there is no
person monitoring unauthorized intrusions beyond the external
security surface 22; accordingly, by setting internal
security surfaces 21, the security system can be devised so
that monitoring processing between the internal security
surfaces 21 and external security surface 22 can be
automatically executed.
The user 2-1 or 2-2 (constituting the operator) operates
the input unit 51 of the control localizer 11 so that the mode
of the control localizer 11 is shifted to the setting mode for
the internal security surfaces 21. Then, the operator sets
the internal security surfaces 21 as follows while carrying
one of the mobile localizers 13.
As a first step, the operator moves the mobile localizer
13 to the presumed vicinity of the internal security surface
21. As a second step, the operator presses the operating
button 109 (as a position registration button) of the mobile
localizer 13. Then, as a third step, the fixed localizers 12
respectively measure the distances from themselves to the
mobile localizer 13 in this case, and the measured distances
are transmitted to the control localizer 11 as measured
distance transmission information in the format described
above. The control localizer 11 calculates the position of
the mobile localizer 13 in the three-dimensional coordinate
system on the basis of the distances between the respective
fixed localizers 12 and the mobile localizer 13 contained in
the measured distance transmission information that is
transmitted from the respective fixed localizers 12, and
stores the calculated position of the mobile localizer 13 in
the three-dimensional coordinate system as a registration
point.
The processing of the first step through third step is
repeated until the number of registration points reaches a
specified number, e. g., 10 points. However, the operator
registers the positions in the three-dimensional coordinate
system so that lines connecting the registration points are
present on all of the planes of the envisioned internal
security surfaces 21.
As a fourth step, the control localizer 11 determines the
smallest rectangular solid that surrounds the registered
registration points. Here, the floor surface of this smallest
rectangular solid is set as a plane that is 1 meter lower than
the mean value of the z coordinate positions (positions in the
vertical direction of the three-dimensional coordinate system)
of the respective registration points, the ceiling surface of
the smallest rectangular solid is set as a place that is 1
meter upper than the mean value of the z coordinate positions
(positions in the vertical direction of the three-dimensional
coordinate system) of the respective registration points. The
reason for this is that the positioning of the mobile
localizer 13 in the vicinity of the floor surface or the
vicinity of the ceiling surface is in most cases either
difficult to accomplish, or else requires an unreasonable
physical attitude on the part of the operator.
As a fifth step, the control localizer 11 registers
(stores in memory) the smallest rectangular solid determined
by the processing of the fourth step as an internal security
surface 21.
In cases where non-guard processing is performed with an
authorized person present inside, as in a vehicle 7, the
processing that sets the internal security surfaces 21 is
omitted.
A concrete example of application to a home security
system will be described with reference to Fig. 1.
In the example shown in Fig. 1, the control localizer 11
is disposed on the inside wall of a home 1 constituting one
example of an object of security. Furthermore, a fixed
localizer 12-1 and a fixed localizer 12-2 are disposed on the
wall on which the control localizer 11 is disposed. Moreover,
a fixed localizer 12-3 is disposed on a different wall from
the wall on which the control localizer 11 is disposed.
The respective localizers are fastened to these objects
by means of surface fasteners.
A three-dimensional coordinate system with the control
localizer 11 as the origin is set by the processing described
above, the positions of all of the fixed localizers 12 in the
three-dimensional coordinate system are measured, and the
control localizer 11 stores the positions of the respective
localizers in the three-dimensional coordinate system in
memory in association with the localizers IDS of the
respective localizers.
Then, the external security surface 22 and internal
security surfaces 21 are set. In this case, the users 2-1 and
2-2 who are authorized members (inhabitants) of this home 1
have mobile localizers 13 mounted on their bodies as pendants
or wristwatches.
Here, one internal security surface 21 may be set inside
one external security surface 22 as shown in Fig. 1, or two
internal security surfaces 21, i. e., an internal security
surface 21-1 and an internal security surface 21-2, may be set
inside one external security surface 22 as shown in Fig. 6.
In this latter case, the processing that sets aninternal
security surface 21 is performed twice. Furthermore, the
number of internal security surfaces 21 may be an arbitrary
number.
In this latter case, the processing that sets an
When the external security surface 22 is registered, and
the internal security surfaces 21 are registered (if
necessary), the processing of the execution mode is performed
on the basis of the registered external security surface 22 or
internal security surfaces 21.
Even during the execution of this execution mode, a shift
to another mode (e. g., the setting mode for the external
security surface 22) can be effected if the switch of the
input unit 51 of the control localizer 11 is operated.
Specifically, the processing of the execution mode is ended,
and the execution of the processing of another mode that is to
be started is initiated, by the processing of step S7 in Fig.
7 described later.
In this execution mode, the processing that is started is
automatically switched in accordance with the positional
relationship of the mobile localizer 13, external security
surface 22 and internal security surfaces 21. Specifically,
one of three types of processing, i. e., caretaker guard
processing, at-home guard processing or non-guard processing,
is automatically started at an appropriate time.
Next, the processing of the execution mode will be
described with reference to the flow chart shown in Fig. 7.
In step S1, the control localizer 11 and fixed localizers
12 measure the positions of all of the mobile localizers 13
that issue ID codes (network IDs) for authorized members.
Specifically, the control localizer 11 transmits
instructions to measure and report the distances to the mobile
localizers 13 to the respective fixed localizers 12 in the
network system. The distance measuring units 73 of the
respective fixed localizers 12 receiving these instructions
measure the distances to the respective mobile localizers 13.
Each of the fixed localizers 12 notifies the control
localizer 11 of the distances to the mobile localizers 13 by
transmitting measured distance transmission information in the
abovementioned format that indicates the distances between
itself and the respective mobile localizers 13 to the control
localizer 11.
Furthermore, the distance measuring unit 43 of the
control localizer 11 measures the distances to the mobile
localizers 13. The control localizer 11 calculates and stores
in memory the positions of the respective mobile localizers 13
on the basis of the results of the measurement of the
distances to the mobile localizers 13 and the notification
from the respective fixed localizers 12.
In step S2, the control unit 41 of the control localizer
11 judges whether or not there are mobile localizers 13 for
which position measurement has been successful. Specifically,
if there are absolutely no mobile localizers 13 in places that
allow measurement of the distance between these mobile
localizers and fixed localizers 12, or in cases where such
mobile localizers are present, but comprise only mobile
localizers 13 whose distance cannot be measured because of
loss of the battery power supply, the control localizer 11
judges that there are no mobile localizers 13 allowing
successful position measurement. Furthermore, in cases where
the control localizer 11 and fixed localizers 12 cannot
communicate with other mobile localizers 13 belonging to the
network system so that mutual distances cannot be measured,
and only mobile localizers 13 belonging to other networks are
in positions that allow communication and distance measurement,
the control localizer 11 judges that there are no mobile
localizers 13 allowing successful position measurement.
The mobile localizers 13 communicate or judge mutual
distances by means of signals modulated using a network ID
which is a code peculiar to the network system to which these
mobile localizers 13 belong. In cases where there are one or
more mobile localizers 13 allowing successful position
measurement belonging to the network system to which a given
mobile localizer 13 belongs, it is judged that there are
mobile localizers 13 allowing successful position measurement.
In cases where it is judged in step S2 that there are
mobile localizers 13 allowing successful position measurement,
the processing proceeds to step S3, and the control unit 41 of
the control localizer 11 judges whether or not mobile
localizers 13 are present inside the external security surface
22. The control localizer 11 judges whether or not mobile
localizers 13 are present inside the external security surface
22 by comparing the coordinate positions indicating the scope
of the external security surface 22 and the coordinate
positions of the mobile localizers 13.
In cases where it is judged in step S3 that there are
mobile localizers 13 present inside the external security
surface 22, the processing proceeds to step S4, and the
control unit 41 of the control localizer 11 judges whether or
not internal security surface 21 have been set.
For example, in cases where authorized members using the
home 1 are sleeping in the bedroom at night, the bedroom
region is taken as an internal security surface 21. As a
result, the network system of the bedroom is appropriately
controlled, and the operation of the actuators (e. g. white
smoke generating modules 49) can be controlled so that
unauthorized intruders 3 do not approach the internal security
surface 21 (e. g., bedroom).
In cases where it is judged in step S4 that an internal
security surface 21 has been set, the processing proceeds to
step S5.
In step S5, the control unit 41 of the control localizer
11 judges whether or not all of the mobile localizers 13
allowing successful position measurement are positioned inside
the internal security surface 21. For example, in cases where
the internal security surface 21 is the bedroom, it is judged
whether or not [all of] the authorized members using the home
1 are in the bedroom.
In cases where it is judged in step S5 that not all of
the mobile localizers 13 allowing successful position
measurement are positioned inside the internal security
surface 21, the processing proceeds to step S6, the control
localizer 11 executes non-guard processing, and the processing
proceeds to step S7. The details of non-guard processing will
be described later.
In cases where it is judged in step S5 that not all of
the mobile localizers 13 allowing successful position
measurement are positioned inside the internal security
surface 21, since it has been judged in step S3 that mobile
localizers 13 positioned inside the external security surface
22 are present, and since it has been judged in step S4 that
an internal security surface 21 has been set, this means that
(for example) either the mobile localizer 13-1 or the mobile
localizer 13-3 is positioned on the outside of the internal
security surface 21 and on the inside of the external security
surface 22 as shown in Fig. 8. In such cases, since there is
no need to perform guard processing, non-guard processing is
performed.
In step S7, the control unit 41 of the control localizer
11 judges whether or not mode switching has been instructed.
For example, in step S7, the control localizer 11 checks in
order to ascertain whether or not an operation shifting to
another mode such as the setting of an internal security
surface 21, the setting of an external security surface 22 or
the like has been applied to the input unit 51.
In cases where it is judged in step S7 that no mode
change has been instructed, the processing returns to step S1,
and the abovementioned processing is repeated.
In cases where it is judged in step S7 that a mode change
has been instructed, the processing of the execution mode is
ended.
In cases where it is judged in step S5 that all of the
mobile localizers 13 allowing successful position judgment are
positioned inside the internal security surface 21, the
processing proceeds to step S8, the control localizer 11
executes at-home guard processing, and the processing proceeds
to step S7. The details of at-home guard processing will be
described later.
In cases where it is judged in step S5 that all of the
mobile localizers 13 allowing successful position judgment are
positioned inside the internal security surface 21, since it
has been judged in step S3 that mobile localizers 13
positioned inside the external security surface 22 are present,
and since it has been judged in step S4 that an internal
security surface 21 has been set, this means that (for example)
both of the mobile localizers 13-1 and 13-2 are positioned
inside the internal security surface 21 as shown in Fig. 9.
In such cases, since it is necessary to protect the authorized members inside theinternal security surface 21, at-home guard
processing is executed.
In such cases, since it is necessary to protect the authorized members inside the
In cases where it is judged in step S4 that no internal
security surface 21 has been set, the processing proceeds to
step S9, the control localizer 11 executes non-guard
processing, and the processing then proceeds to step S7.
In cases where it is judged in step S3 that no mobile
localizers 13 positioned inside the external security surface
22 are present, or in cases where it is judged in step S2 that
there are no mobile localizers 13 allowing successful position
measurement, i. e., in cases where the positions of all of the
mobile localizers 13 allowing successful position judgment are
outside the external security surface 22, the processing
proceeds to step S10, the control localizer 11 executes
caretaker guard processing, and the processing then proceeds
to step S7.
For example, this means that the security system
automatically executes caretaker guard processing immediately
after the authorized members on which the mobile localizers 13
are mounted leave this home 1 as shown in Fig. 10.
In a conventional home security system, when the home is
to be guarded in the absence of the inhabitants, a button
operation must be performed in order to switch to the
caretaker guard mode. If this is forgotten, the painstakingly
devise home security system usually does not operate at the
most important time. The home security system of the present
invention does not require a bothersome operation, and can
securely perform processing that securely protects the object
of security.
Next, the details of non-guard processing will be
described.
Fig. 11 is a flow chart which illustrates the details of
non-guard processing corresponding to the processing of step
S6 or step S9 in Fig. 7.
In step S21, the control localizer 11 and respective
fixed localizers 12 measure the distances between the control
localizer 11 and the fixed localizers 12, and the distances
between the respective fixed localizers 12.
For example, under the control of the control unit 41,
the distance measuring unit 43 of the control localizer 11
measures the distances between the control localizer 11 and
the respective fixed localizers 12, and supplies the
measurement results to the control unit 41. Under the control
of the control units 71, the distance measuring units 73 of
the respective fixed localizers 12 measure the distances
between themselves and the other fixed localizers 12. The
control units 71 of the respective fixed localizers 12 cause
the wireless transmitting and receiving units 74 to transmit
measured distance transmission information indicating the
distances between themselves and other fixed localizers 12
obtained by this measurement to the control localizer 11.
The control unit 41 of the control localizer 11 causes
the wireless transmitting and receiving unit 44 to receive the
measured distance transmission information indicating the
distances between the fixed localizers 12 that is transmitted
from the respective fixed localizers 12. The control unit 41
of the control localizer 11 acquires the measured distance
transmission information indicating the distances between the
fixed localizers 12 that is received by the wireless
transmitting and receiving unit 44 via the data communications
unit 46.
In step S22, the control localizer 11 produces an inter-localizer
distance matrix that indicates the distances between
the control localizer 11 and the fixed localizers 12, and the
distances between the respective fixed localizers 12. For
example, the control unit 41 of the control localizer 11
produces an inter-localizer distance matrix whose elements are
the distances between the control localizer 11 and fixed
localizers 12 and the distances between the respective fixed
localizers 12 by arranging values that indicate the distances
between the control localizer 11 and the respective fixed
localizers 12 and values that indicate the distances between
the respective fixed localizers 12 in the order of the values
of the localizer IDs on the basis the measured distance
transmission information indicating the distances between the
control localizer 11 and the respective fixed localizers 12
and the distances between the respective fixed localizers 12
acquired by the processing of step S21.
In step S23, the control localizer 11 stores the inter-localizer
distance matrix in memory. For example, in step S23,
the control unit 41 of the control localizer 11 stores the
inter-localizer distance matrix in the memory 42.
In step S24, the control localizer 11 and respective
fixed localizers 12 perform an auto-diagnosis. For example,
in step S24, the control localizer 11 and respective fixed
localizers 12 respectively diagnose the respective units that
constitute these localizers themselves.
To describe this in greater detail, for example, in step
S24, the control localizer 11 and respective fixed localizers
12 perform an auto-diagnosis by investigating the residual
charge of the batteries of the power supply unit 53 or power
supply unit 81, and the residual amount of the raw materials
of the white smoke or the like of the white smoke generating
modules 49 or white smoke generating modules 79. In greater
detail, the control localizer 11 and respective fixed
localizers 12 perform an auto-diagnosis by comparing the
residual charge of the batteries of the power supply unit 53
or power supply unit 81 with a specified threshold value, or
comparing the residual amount of the raw materials of the
white smoke or the like of the white smoke generating modules
49 or white smoke generating modules 79 with another specified
threshold value. The fixed localizers 12 notify the control
localizer 11 of the results of this auto-diagnosis.
In step S25, the control unit 41 of the control localizer
11 judges whether or not there is any trouble on the basis of
the results of the auto-diagnosis of the control localizer 11
and the results of the auto-diagnosis of the respective fixed
localizers 12 (of which the control localizer 11 has been
notified by the respective fixed localizers 12).
In cases where it is judged in step S25 that trouble has
occurred, the processing proceeds to step S26, the control
unit 41 of the control localizer 11 operates the speaker 48 or
the display unit 52, thus notifying the users 2-1 and 2-2 of
the trouble, and the non-guard processing is ended. For
example, in step S26, the control unit 41 causes the speaker
to output a sound that indicates the content of the trouble.
Alternatively, for example, in step S26, the control unit 41
causes the display device 52 to display an image or characters
that indicate the content of the trouble.
In cases where it is judged in step S25 that there is no
trouble, since there is no need for notification of trouble,
the processing of step S26 is skipped, and the non-guard
processing is ended.
Furthermore, the processing of steps S21 through S26 may
be repeated.
Next, the details of at-home guard processing will be
described.
Fig. 12 is a flow chart illustrating the details of at-home
guard processing, which corresponds to the processing of
step S8 in Fig.7.
In step S41, the control localizer 11 and respective
fixed localizers 12 measure the distances between the control
localizer 11 and the fixed localizers 12, and the distances
between the respective fixed localizers 12.
For example, under the control of the control unit 41,
the distance measuring unit 43 of the control localizer 11
measures the distances between the control localizer 11 and
the respective fixed localizers 12, and supplies the
measurement results to the control unit 41. Furthermore,
under the control of the control units 71, the distance
measuring units 73 of the respective fixed localizers 12
measure the distances between themselves and other fixed
localizers 12. The control units 71 of the respective fixed
localizers 12 cause the wireless transmitting and receiving
units 74 to transmit measured distance transmission
information indicating the distances between themselves and
other fixed localizers 12 (acquired by the abovementioned
measurements) to the control localizer 11.
The control unit 41 of the control localizer 11 causes
the wireless transmitting and receiving unit 44 to receive
measured distance transmission information indicating the
distances between respective fixed localizers 12 that is
transmitted from the respective fixed localizers 12. The
control unit 41 of the control localizer 11 acquires the
measured distance transmission information indicating the
distances between the respective fixed localizers 12 that is
received by the wireless transmitting and receiving unit 44
via the data communications unit 46.
In step S42, the control localizer 11 produces an inter-localizer
distance matrix that indicates the distances between
the control localizer 11 and fixed localizers 12, and the
distances between the respective fixed localizers 12. For
example, the control unit 41 of the control localizer 11
produces an inter-localizer distance matrix whose elements are
the distances between the control localizer 11 and fixed
localizers 12 and the distances between the respective fixed
localizers 12 by arranging values that indicate the distances
between the control localizer 11 and the respective fixed
localizers 12 and values that indicate the distances between
the respective fixed localizers 12 in the order of the values
of the localizer IDs on the basis the measured distance
transmission information indicating the distances between the
control localizer 11 and the respective fixed localizers 12
and the distances between the respective fixed localizers 12
acquired by the processing of step S41.
In step S43, the control unit 41 of the control localizer
11 judges whether or not there are any differences between the
inter-localizer distance matrix that is produced and an inter-localizer
distance matrix stored in memory for the control
localizer 11 and fixed localizers 12 that are inside the
external security surface 22 and outside the internal security
surface 21.
In non-guard processing, the inter-localizer distance
matrix that is stored in memory is further updated to values
that indicated the distances between the localizers at that
point in time (i. e., the point in time at which the non-guard
processing is executed). Accordingly, in step S43,
differences between the last updated inter-localizer distance
matrix and the current inter-localizer distance matrix are
detected. These differences are calculated as the sum of the
absolute values of the differences for each corresponding
element in the range in which distance measurement is possible
within the inter-localizer distance matrix that is stored in
memory and the inter-localizer distance matrix at the current
point in time.
However, in order to prevent the detection of
abnormalities due to the movement of authorized members such
as the users 2-1 and 2-2 of the home 1 or the like inside the
internal security surface 21 (i. e., in order to prevent
erroneous detection), differences generated by the movement of
the localizers themselves inside the internal security surface
21 are not used in the calculation of this sum.
The control units 41 judge that there is an abnormality
(i. e., "abnormality present") if the abovementioned sum
exceeds a predetermined threshold value. If the fixed
localizers 12 are mounted on the window 4, door 5 or safe 6 as
shown in Fig. 1, then the distances between the localizers
mounted on the window 4 and door 5 and other localizers will
vary if the window 4 moves (is opened), or if the door 5 moves
(is opened). The same is true if the safe 6 moves. As a
result, the inter-localizer distance matrix varies.
In cases where it is judged in step S43 that there are no
differences between the inter-localizer distance matrix that
is produced and the inter-localizer distance matrix that is
stored in memory for the control localizer 11 and fixed
localizers 12 that are inside the external security surface 22
and outside the internal security surface 21, the processing
proceeds to step S44, and the control localizer 11 and fixed
localizers 12 analyze the wireless signals communicating with
the outside of the internal security surface 21.
In cases where a human being is present between
localizers, the waveform of the wireless signals exchanged
between the localizers varies as a result of being affected by
this human body; accordingly, the control localizer 11 and
fixed localizers 12 detect the presence of a human body
between the control localizer 11 and fixed localizers 12, or
between the respective fixed localizers 12, by waveform
analysis. A fixed localizer 12 that has detected the presence
of a human body then notifies the control localizer 11 of the
detection of this human body by transmitting human body
detection information in the format shown below to the control
localizer 11.
Here, the localizer IDs can be used as the "own node
number" and "partner node number". Furthermore, in the
network system, for example, node numbers indicating the order
of registration which are assigned at the time of registration
can be used as the "own node number" and "partner node number".
The human body detection information indicates that a
human body has been detected between the localizer indicated
by the "own node number" and the localizer indicated by the
"partner node number". A flag indicating the presence or
absence of a human body or a parameter indicating the
thickness of the human body may be used as a detection
parameter in this case.
Thus, the respective fixed localizers 12 transmit human
body detection information indicating the results of the
waveform analysis of the wireless signal to the control
localizer 11.
In step S45, the control unit 41 of the control localizer
11 judges whether or not a human body is present between the
control localizer 11 and fixed localizers 12 or between the
respective fixed localizers 12 inside the external security
surface 22 and outside the internal security surface 21 on the
basis of the human body detection information that is
transmitted from the respective fixed localizers 12, or the
results of human body detection by the control localizer 11
itself.
In cases where it is judged in step S45 that no human
being is present between the control localizer 11 and fixed
localizers 12 or between the respective fixed localizers 12 on
the inside of the external security surface 22 and on the
outside of the internal security surfaces 21, the processing
proceeds to step S46, and the control unit 41 of the control
localizer 11 judges whether or not other guard processing has
been executed.
In step S46, in cases where it is judged that other guard
processing is not being performed, the processing returns to
step S41, and the abovementioned processing is repeated.
In step S46, in cases where it is judged that other guard
processing has been performed, the at-home guard processing is
ended.
In cases where it is judged in step S43 that there are
differences between the inter-localizer distance matrix that
is produced and the inter-localizer distance matrix that is
stored in memory for the control localizer 11 and fixed
localizers 12 that are inside the external security surface 22
and outside the internal security surface 21, or in cases
where it is judged in step S45 that a human being is present
between the control localizer 11 and fixed localizers 12 or
between the respective fixed localizers 12 that are inside the
external security surface 22 and outside the internal security
surface 21, an unauthorized intrusion has occurred;
accordingly, the procedure proceeds to step S47.
In step S47, the control unit 41 causes the wireless
communications unit 50 to notify a specified reporting
destination of the occurrence of an abnormality. For example,
the wireless communications unit 50 reports the occurrence of
an abnormality by wireless transmission to the communications
device of a specified outside party such as the mobile
telephone of the homeowner, the telephone of a security firm
or the like.
Furthermore, as a result of the processing of steps S48
through S50, authorized members such as the users 2-1 and 2-2
of the home 1 inside the internal security surface 21 are
informed of the presence of an unauthorized intruder;
furthermore, the unauthorized intruder 3 tends not to approach
the internal security surface 21. In addition, if possible,
the authorized members such as the users 2-1 and 2-2 of the
home 1 are given evacuation guidance in a direction away from
the position of the unauthorized intruder 3.
Specifically, in step S48, the control unit 41 of the
control localizer 11 causes the white smoke generating module
49 or the white smoke generating modules 79 of the fixed
localizers 12 to emit white smoke.
The white smoke generating module 49 or white smoke
generating modules 79 generate white smoke that is harmless to
the human body or to various types of equipment by heating a
mixture of propylene glycol and water to a temperature of
approximately 200°C. If localizers are thus prepared
beforehand so that these localizers contain a white smoke
generating module 49 or white smoke generating modules 79,
white smoke can be generated when an unauthorized intruder 3
is detected.
For example, the control unit 41 of the control localizer
11 specifies the position (range) of the unauthorized intruder
3 in the three-dimensional coordinate system from elements in
which differences are generated between the inter-localizer
distance matrix that is produced and the inter-localizer
distance matrix that is stored in memory, or from the spaces
between the control localizer 11 and fixed localizers 12 or
the spaces between respective fixed localizers 12 in which a
human body is judged to be present. Furthermore, the control
unit 41 of the control localizer 11 selects the control
localizer 11 (itself) or a fixed localizer 12 that is close to
the position of the unauthorized intruder 3 in the three-dimensional
coordinate system.
In cases where the control unit 41 of the control
localizer 11 selects the control localizer 11 itself, the
white smoke generating module 49 is caused to emit white smoke.
In cases where the control unit 41 of the control
localizer 11 selects a fixed localizer 12, the data
communications unit is caused to transmit a command that
causes the emission of white smoke to the selected fixed
localizer 12 via the wireless transmitting and receiving unit
44. For example, this command that causes the emission of
white smoke contains the localizer ID that is peculiar to the
selected fixed localizer 12.
When such a command that causes the emission of white
smoke is transmitted via wireless transmission, the control
units 71 of the fixed localizers 12 cause the wireless
transmitting and receiving units 74 to receive this command,
and cause the data communications units 76 to extract the
localizer ID contained in this command. The control units 71
of the fixed localizers 12 make a judgment as to whether or
not the extracted localizer ID is the same as their own
localizer ID. In cases where the control unit 71 of the fixed
localizer 12 judges that the extracted localizer ID is the
same as its own localizer ID, a command causing the mission
of white smoke is transmitted to this fixed localizer 12
itself; accordingly, the white smoke generating module 79 is
caused to generate white smoke.
In cases where the control units 71 of the fixed
localizers 12 judge that the extracted localizer ID is not the
same as their own localizer ID, these control units 71 do not
emit white smoke.
In step S49, the control unit 41 of the control localizer
11 causes the speaker 48 or the speakers 78 of the fixed
localizers 12 to generate a warning sound.
For example, the control unit 41 of the control localizer
11 specifies the position (range) of the unauthorized intruder
3 in the three-dimensional coordinate system from elements in
which differences are generated between the inter-localizer
distance matrix that is produced and the inter-localizer
distance matrix that is stored in memory, or from the spaces
between the control localizer 11 and fixed localizers 12 or
spaces between the respective fixed localizers 12 in which it
is judged that a human being is present. Then, the control
unit 41 of the control localizer 11 selects a control
localizer 11 (i. e., itself) or fixed localizer 12 that is
close to the position of the unauthorized intruder 3 in the
three-dimensional coordinate system.
In cases where the control unit 41 of the control
localizer 11 selects the control localizer 11 (i. e., itself),
the speaker 48 is caused to generate a warning sound.
In cases where the control unit 41 of the control
localizer 11 selects a fixed localizer 12, the data
communications unit is caused to transmit a command that
generates a warning sound to the selected fixed localizer 12
via the wireless transmitting and receiving unit 44. For
example, the command that generates a warning sound contains a
localizer ID that is peculiar to the selected fixed localizers
12.
When a command that generates a warning sound is
transmitted via wireless transmission, the control unit 71 of
the fixed localizer 12 causes the wireless transmitting and
receiving unit 74 to receive the command, and causes the data
communications unit 76 to extract the localizer ID that is
contained in the command. The control unit 71 of the fixed
localizer 12 judges whether or not the extracted localizer ID
is the same as its own localizer ID. In cases where the
control unit 71 of the fixed localizer 12 judges that the
extracted localizer ID is the same as its own localizer ID,
since a command that generates a warning sound is transmitted
to this fixed localizer 12 itself, the speaker 78 is caused to
generate a warning sound.
In cases where the control unit 71 of the fixed localizer
12 judges that the extracted localizer ID is not the same as
its own localizer ID, a warning sound is not generated.
Thus, in step S48 and step S49, a warning sound is
generated and white smoke is generated from a fixed localizer
12 in the location where the unauthorized intruder is detected
(i. e., a fixed localizer 12 whose coordinate position varies
or a fixed localizer 12 that has detected a human body between
itself and another fixed localizer 12).
As was described above, the control localizer 11 can
transmit commands to respective fixed localizers 12 by
wireless communications so that a warning sound is generated
and white smoke is generated only from localizers that have
detected a human body or localizers whose three-dimensional
coordinate position has varied (and surrounding localizers).
Consequently, a warning sound and white smoke are generated in
various movement destinations within the home 1 in the
vicinity of the intrusion of the unauthorized intruder 3.
Here, in other words, actuators which have the effect of
generating white smoke and actuators which have the effect of
generating a warning sound are spatially dispersed, and a
wireless communications network is formed, so that this system
acts as an actuator network system in which actuators that are
suitable for responding to abnormalities on the spot act in
accordance with the locations in which such abnormalities
occur.
Thus, fixed localizers 12 which are located outside the
internal security surface 21 and within a specified distance
from the position of the unauthorized intruder 3 generate a
warning sound and generate white smoke.
In cases where the distance between the mobile localizer
13 and the unauthorized intruder equal to or less than a
specified distance, the fixed localizer 12 that is closest to
the unauthorized intruder 3 may contain another repelling
function, and may activate this repelling function. Examples
of such other repelling functions include the emission of a
tear agent spray, an increase in the sound volume of the
warning sound and the like. As a result, authorized members
of the home 1 can be protected from unauthorized intruders 3
who have approached these authorized members of the home 1.
In step S50, the control unit 41 of the control localizer
11 causes the speaker 48 or the speakers 78 of the fixed
localizers 12 to generate a sound that provides evacuation
guidance.
Authorized members of the home 1 who are located inside
the internal security surface 21 are notified of the presence
of an unauthorized intruder 3 by this warning sound.
For example, the control localizer 11 measures the
distance to the mobile localizer 13. Furthermore, the control
localizer 11 transmits commands that cause the respective
fixed localizers 12 to measure the distances from these fixed
localizers 12 to the mobile localizer 13. The respective
fixed localizers 12 measure the distances to the mobile
localizer 13 and transmit the measurement results to the
control localizer 11.
The control localizer 11 calculates the position of the
mobile localizer 13 in the three-dimensional coordinate system
on the basis of information indicating the distance to the
mobile localizer 13 measured by the control localizer 11
itself, and information indicating the distances from the
respective fixed localizers 12 to the mobile localizer 13
transmitted from the respective fixed localizers 12.
Then, the control unit 41 of the control localizer 11
selects the control localizer 11 (i. e., itself) or fixed
localizer 12 in the position that is closest to the position
of the mobile localizer 13 in the three-dimensional coordinate
system.
In cases where the control unit 41 of the control
localizer 11 selects the control localizer 11 (i. e., itself),
the speaker 48 is caused to generate a sound that provides
evacuation guidance.
In cases where the control unit 41 of the control
localizer 11 selects a fixed localizer 12, the data
communications unit is caused to transmit a command that
generates a sound providing evacuation guidance to the
selected fixed localizer 12 via the wireless transmitting and
receiving unit 44. For example, the command that generates a
warning sound contains a localizer ID that is peculiar to the
selected fixed localizer 12.
When a command that generates a sound providing evacuation guidance is transmitted via wireless transmission, thecontrol
unit 71 of the fixed localizer 12 causes the wireless
transmitting and receiving unit 74 to receive the command, and
causes the data communications unit 76 to extract the
localizer ID that is contained in the command. The control
unit 71 of the fixed localizer 12 judges whether or not the
extracted localizer ID is the same as its own localizer ID.
In cases where thecontrol unit 71 of the fixed localizer 12
judges that the extracted localizer ID is the same as its own
localizer ID, since a command that generates a sound providing
evacuation guidance is transmitted to the fixed localizer 12
itself, the speaker 78 is caused to generate a sound providing
evacuation guidance.
When a command that generates a sound providing evacuation guidance is transmitted via wireless transmission, the
In cases where the
For example, a fixed localizer 12 which is located at a
specified distance or less from the mobile localizer 13, and
which is furthest from the unauthorized intruder 3 generates a
sound (evacuation guidance sound) that differs from the
warning sound. The authorized members of the home 1 can
automatically move away from the unauthorized intruder 3 by
moving toward this evacuation guidance sound.
Following the processing of step S50, the procedure
returns to step S41. As a result, the position of the
unauthorized intruder 3 in the three-dimensional coordinate
system is repeatedly detected, and in cases where the
unauthorized intruder 3 is present inside the external
security surface 22, the processing of steps S47 through S50
is repeated on the basis of the position of the unauthorized
intruder 3 in the three-dimensional coordinate system.
Next, the details of caretaker guard processing will be
described.
Fig. 12 is a flow chart showing the details of caretaker
guard processing, corresponding to the processing of step S10
in Fig. 7.
The processing of step S71 and the processing of step S72
are respectively similar to the processing of step S41 and the
processing of step S42 in Fig. 12; accordingly, a description
of these steps is omitted.
In step S73, a judgment is made as to whether or not
there are differences between the inter-localizer distance
matrix that is produced and the inter-localizer distance
matrix that is stored in memory for the control localizer 11
and fixed localizers 12 inside the external security surface
22.
In non-guard processing, the inter-localizer distance
matrix that is stored in memory is updated to values
indicating the distances between the localizers at that point
in time (the point in time at which non-guard processing is
executed). Accordingly, in step S73, the differences between
the last updated inter-localizer distance matrix and the
current inter-localizer distance matrix are detected. These
differences are calculated as the sum of the absolute values
of the differences for each corresponding element in the range
in which distance measurement is possible within the inter-localizer
distance matrix that is stored in memory and the
inter-localizer distance matrix at the current point in time.
The control unit 41 judges that there is an abnormality
(i. e., "abnormality present") if the abovementioned sum
exceeds a predetermined threshold value. If the fixed
localizers 12 are mounted on the window 4, door 5 or safe 6 as
shown in Fig. 1, then the distances between the localizers
mounted on the window 4 and door 5 and other localizers will
vary if the window 4 moves (is opened), or if the door 5 moves
(is opened). The same is true if the safe 6 moves. As a
result, the inter-localizer distance matrix varies.
In cases where it is judged in step S73 that there are no
differences between the inter-localizer distance matrix that
is produced and the inter-localizer distance matrix that is
stored in memory for the control localizer 11 and fixed
localizers 12 that are inside the external security surface 22,
the processing proceeds to step S74, and the control localizer
11 and fixed localizers 12 analyze the waveform of the
wireless signals communicating with the inside of the external
security surface 22 by processing similar to the processing of
step S44.
In step S75, the control unit 41 of the control localizer
11 judges whether or not a human body is present between the
control localizer 11 and fixed localizers 12 or between the
respective fixed localizers 12 inside the external security
surface 22 on the basis of the human body detection
information that is transmitted from the respective fixed
localizers 12, or the results of human body detection by the
control localizer 11 itself.
In cases where it is judged in step S75 that no human
being is present between the control localizer 11 and fixed
localizers 12 or between the respective fixed localizers 12 on
the inside of the external security surface 22, the processing
proceeds to step S76, and the control unit 41 of the control
localizer 11 judges whether or not other guard processing has
been executed.
In cases where it is judged in step S76 that no other
guard processing has been executed, the processing returns to
step S71, and the abovementioned processing is repeated.
In cases where it is judged in step S76 that other guard
processing has been executed, the at-home guard processing is
ended.
In cases where it is judged in step S73 that there are
differences between the inter-localizer distance matrix that
is produced and the inter-localizer distance matrix that is
stored in memory for the control localizer 11 and fixed
localizers 12 inside the external security surface 22, or in
cases where it is judged in step S75 that a human being is
present between the control localizer 11 and fixed localizers
12 or between the respective fixed localizers 12 inside the
external security surface 22, this means that there has been
an unauthorized intrusion; accordingly, the procedure
proceeds to step S77.
The processing of steps S77 through S79 is similar to the
processing of steps S47 through S49 in Fig. 12; accordingly,
a description of this processing will be omitted.
Following the processing of step S80, the procedure
returns to step S71. As a result, the position of the
unauthorized intruder 3 in the three-dimensional coordinate
system is repeatedly detected, and in cases where an
unauthorized intruder 3 is present inside the external
security surface 22, the processing of steps S77 through S79
is repeated on the basis of the position of the unauthorized
intruder 3 in the three-dimensional coordinate system.
Fig. 14 is a diagram which illustrates the emission of
white smoke.
In the example shown in Fig. 14, the security system
comprises a control localizer 11, fixed localizers 12-1
through 12-18, and a mobile localizer 13. The control
localizer 11, fixed localizers 12-1 through 12-18 and mobile
localizer 13 are disposed in various locations in the rooms
201-1 through 201-3 of a home 1, and on the outside of this
home 1.
For example, the fixed localizer 12-4 is attached to a
window 4-1. The fixed localizer 12-8 is attached to a window
4-2. The fixed localizer 12-16 is attached to a window 4-3.
The fixed localizer 12-6 is attached to a door 5-1. The
fixed localizers 12-1 and 12-7 are attached to a door 5-2.
The fixed localizer 12-11 is attached to a door 5-3. The
fixed localizers 12-12 and 12-13 are attached to a door 5-4.
As is shown in Fig. 14, when the window 4-1 of the home 1
is opened, and an unauthorized intruder 3 makes an
unauthorized intrusion into the room 201-1 of the home 1,
white smoke is emitted from the fixed localizer 12-4 that is
attached to the window 4-1, and from the nearby fixed
localizers 12-3 and 12-7.
Specifically, when an unauthorized intruder 3 intrudes
from the window 4-1 of the room 201-1, an unauthorized
intruder 3 is considered to be present in the vicinity of the
fixed localizer 12-4 whose position in the three-dimensional
coordinate system moves as a result of the opening of the
window 4-1, and the fixed localizer 12-4 attached to this
window generates a warning sound and emits a stream of white
smoke. White smoke is also emitted from the fixed localizers
12-3 and 12-7 located near the fixed localizer 12-4 that is
attached to the window 4-1 of the room 201-1.
In at-home guard processing, the fixed localizers 12-15
and 12-16 which are positioned near the mobile localizers 13
and positioned in a direction away from the position of the
unauthorized intruder 3 provide evacuation guidance to the
authorized members (on which the mobile localizers 13
positioned inside the internal security surface 21 are mounted)
in a direction away from the position of the unauthorized
intruder 3 by outputting a sound.
Next, a case in which the present invention is applied to
a car security system will be described with reference to Fig.
15.
A control localizer 11 is disposed in an arbitrary
location in the interior of a vehicle 7 (other than the doors
301-1 through 301-4). One or more fixed localizers 12 are
disposed on the insides of the respective doors 301-1 through
301-4.
For example, a fixed localizer 12-1 is disposed on the
inside of the door 301-1, a fixed localizer 12-2 is disposed
on the inside of the door 301-2, a fixed localizer 12-3 is
disposed on the inside of the door 301-3, and a fixed
localizer 12-4 is disposed on the inside of the door 301-4.
Authorized members using this vehicle 7 have mobile
localizer 13.
The setting of a three-dimensional coordinate system, the
setting of the positions of all of the fixed localizers in
this three-dimensional coordinate system and the setting of an
external security surface 22 are performed by processing
similar to that described above.
Subsequently, the car security system executes processing
of the execution mode. The processing of this execution mode
is similar to the processing that was described with reference
to Fig. 7. Since no internal security surface 21 is set, at-home
guard processing is not started (executed). Accordingly,
in this car security system, only two types of guard
processing, i. e., caretaker guard processing and non-guard
processing, are executed. Such caretaker guard processing and
non-guard processing are respectively similar to the
processing that was described with reference to Fig. 13 and
the processing that was described with reference to Fig. 11.
In the case of caretaker guard processing, if the fixed
localizers 12 contain speakers 78 (used to generate a warning
sound) as actuators, and also contain white smoke generating
modules, then the fixed localizers 12 will emit a warning
sound and will also emit a stream of white smoke throughout
the interior of the vehicle when any of the doors 301-1
through 301-4 are opened.
As a result, even if there is an attempted unauthorized
intrusion into the interior of the vehicle 7, the unauthorized
intruder 3 cannot utilize his visual sense in the vehicle
interior, so that criminal behavior is prevented.
Thus, in the present invention, automatic switching
between guard processing and non-guard processing is possible,
so that the problem of forgetting to switch [modes] can be
prevented, thus making it possible to prevent erroneous
operation of the security system.
Furthermore, unauthorized intruders can be repulsed by
the operation of the actuators in response to the positions of
the unauthorized intruders.
Moreover, unauthorized intruders can be prevented from
approaching authorized members who are present with a [given]
region, and authorized members located within this region can
be given evacuation guidance while these members avoid such
unauthorized intruders. Furthermore, security surfaces whose
setting is required for the automatic switching between guard
processing and non-guard processing can be simply set and
registered using mobile localizers 13.
Thus, in cases where the system is devised so that the
positions of authorized members using the object of security
can be detected, the positions of unauthorized intrusions into
the object of security can be detected, processing with
respect to unauthorized intrusions can be executed with [the
system] disposed in a plurality of locations within the object
of security, the execution means that execute processing can
be selected in accordance with the relationship between the
detected positions of the authorized members and the detected
positions of unauthorized intrusions, and the execution of
processing by the selected execution means is controlled,
specified processing with respect to unauthorized intrusions
can be executed in accordance with conditions in the object of
security without any need for a bothersome operation.
In cases where the system is devised so that the
positions of authorized members using the object of security
can be detected, the positions of unauthorized intrusions into
the object of security can be detected, the position of an
external security surface can be stored in memory, the
position of an internal security surface can be stored in
memory, the execution of first guard processing or second
guard processing is controlled so that first guard processing
is executed on the basis of the detected positions of the
authorized members in cases where there are no authorized
members inside the external security surface, and so that
second guard processing is executed in cases where there are
authorized members inside the internal security surface, and
processing with respect to unauthorized intrusions is executed
when the position of an unauthorized intrusion into the object
of security is detected in cases where first guard processing
or second guard processing is executed, specified processing
with respect to unauthorized intrusions can be executed in
accordance with conditions in the object of security without
any need for a bothersome operation.
In cases where the system is devised so that information
is transmitted and received, signals modulated by a specified
code are transmitted and received, the distances to devices
constituting partners in wireless transmission and reception
are measured, signals modulated by a code are transmitted and
received, data communications with the devices are performed,
specified processing with respect to unauthorized intrusions
is executed, and overall control is performed, unauthorized
intrusions can be detected, and specified processing with
respect to unauthorized intrusions can be executed.
In cases where the system is devised so that the
distances to partners are measured, human bodies between the
system itself and partners are detected by the waveform
analysis of wireless transmission signals, and information
indicating the measured distances to partners or information
indicating the detection of human bodies is transmitted,
unauthorized intrusions can be detected, and specified
processing with respect to unauthorized intrusions can be
executed.
In cases where the system is devised so that the
distances from the system itself to respective terminal
devices are measured, information indicating the distances
between respective terminal devices that is transmitted from
these respective terminal devices is received, and a judgment
is made as to whether or not there has been an unauthorized
intrusion into object of security on the basis of the
distances from the system itself to respective terminal
devices or the distances between respective terminal devices,
unauthorized intrusions can be detected, and specified
processing with respect to unauthorized intrusions can be
executed.
In cases where a vehicle security system is constructed
from fixed terminal devices which are disposed on the inside
surfaces of the respective doors of a vehicle, and which
measure the distances from these terminal devices to other
terminal devices and a control terminal device, a mobile
terminal device held by a person have the proper authorization
to enter and exit this vehicle, and a control terminal device
which is disposed inside the vehicle, and this system is
devised so that variations in the distances between fixed
terminal devices and a control terminal device and the
distances between respective terminal devices disposed inside
the vehicle are monitored in cases where the position of the
mobile terminal device is outside an external security surface
set by fixed terminal devices and a control terminal device
disposed inside the vehicle, it is judged that an abnormality
has occurred in cases where the variation in distances
satisfies specified conditions, and specified processing with
respect to unauthorized intrusions is executed in cases where
it is judged that an abnormality has occurred, unauthorized
intrusions can be detected, and specified processing with
respect to unauthorized intrusions can be executed.
In cases where the system is devised so that fixed nodes
sense the surrounding environment, wireless communications are
performed, an action is applied to the outside, information
relating to the sensed surrounding conditions is transmitted
to a control node, a control action is performed so that
actuators are operated in response to commands from the
control node, the control node performs wireless
communications, the fixed node that is to operate the actuator
is selected on the basis of information relating to the
surrounding environment that is received from the fixed nodes,
and commands that are used to operate the actuator are
transmitted to the selected fixed node, unauthorized
intrusions can be detected, and specified processing with
respect to unauthorized intrusions can be executed.
In cases where the system is devised so that the position
of a first terminal device is taken as the origin of a three-dimensional
coordinate system, the distance between a first
terminal device and a second terminal device, the distance
between a first terminal device and a third terminal device
and the distance between a second terminal device and a third
terminal device are respectively measured, the first axis of
the three-dimensional coordinate system is specified by
applying a specified mathematical operation to first
measurement results that indicate the distance between the
first terminal device and second terminal device, the distance
between the first terminal device and third terminal device
and the distance between the second terminal device and third
terminal device, the second axis of the three-dimensional
coordinate system is specified by applying a specified
mathematical operation to the first measurement results, the
distance between the first terminal device and fourth terminal
device, the distance between the second terminal device and
fourth terminal device and the distance between the third
terminal device and fourth terminal device are respectively
measured, and the third axis of the three-dimensional
coordinate system is specified from second measurement results
indicating the distance between the first terminal device and
fourth terminal device, the distance between the second
terminal device and fourth terminal device and the distance
between the third terminal device and fourth terminal device,
the first axis and the second axis.
The first invention makes it possible to detect
unauthorized intrusions. Furthermore, by using the first
invention, it is possible to execute specified processing with
respect to unauthorized intrusions in accordance with
conditions in the object of security without any need for a
bothersome operation.
The second invention makes it possible to detect
unauthorized intrusions. Furthermore, by using the second
invention, it is possible to execute specified processing with
respect to unauthorized intrusions in accordance with
conditions in the object of security without any need for a
bothersome operation.
The third invention makes it possible to detect
unauthorized intrusions. By using the third invention, it is
possible to detect unauthorized intrusions and to execute
specified processing with respect to unauthorized intrusions.
The fourth invention makes it possible to detect
unauthorized intrusions. By using the fourth invention, it is
possible to detect unauthorized intrusions and to execute
specified processing with respect to unauthorized intrusions.
The fifth invention makes it possible to detect
unauthorized intrusions. By using the fifth invention, it is
possible to detect unauthorized intrusions and to execute
specified processing with respect to unauthorized intrusions.
The sixth invention makes it possible to detect
unauthorized intrusions. By using the sixth invention, it is
possible to detect unauthorized intrusions and to execute
specified processing with respect to unauthorized intrusions.
The seventh invention makes it possible to detect
unauthorized intrusions. By using the seventh invention, it
is possible to detect unauthorized intrusions and to execute
specified processing with respect to unauthorized intrusions.
The eighth invention makes it possible to execute area
setting for the setting and release of guard modes in a simple
manner.
Claims (29)
- A security system which executes specified processing with respect to an unauthorized intrusion into an object of security in cases where such an unauthorized intrusion is detected, comprising:member position detection means which detect the positions of authorized members using said object of security;unauthorized intrusion position detection means which detect the position of said unauthorized intrusion into said object of security;execution means which are disposed in a plurality of locations inside said object of security, and which execute said processing with respect to said unauthorized intrusion; andexecution control means which select said execution means that execute said processing in accordance with the relationship of the positions of said authorized members detected by said member position detection means and the position of said unauthorized intrusion detected by said unauthorized intrusion position detection means, and which control the execution of said processing by said selected execution means.
- The security system according to claim 1, characterized in that said execution control means select one or more execution means including said execution means closest to the position of said unauthorized intrusion in cases where the distance between the position of said unauthorized intrusion and the positions of said authorized members is equal to or less than a specified threshold value, and control the execution of said processing so as to cause the selected execution means to execute said processing with respect to said unauthorized intrusion.
- The security system according to claim 1, characterized in that said execution control means control the execution of said processing so that said processing for guiding the evacuation of said authorized members is executed by said execution means whose distance from the position of said authorized members is equal to or less than a specified threshold value, and whose distance from the position of said unauthorized intrusion is maximal.
- The security system according to claim 1, characterized in that said execution means execute said processing that generates white smoke.
- The security system according to claim 1, characterized in that said member position detection detect the positions of said authorized members by detecting the positions of devices which are mounted on said authorized members, and which transmit by wireless transmission an ID code that corresponds to the object of security.
- The security system according to claim 1, characterized in that said member position detection means detect the positions of said authorized members by detecting the positions of devices which are mounted on said authorized members, which transmit by wireless transmission an ID code that corresponds to the object of security, and on which said execution means are disposed.
- A security system which executes specified processing with respect to an unauthorized intrusion into an object of security in cases where such an unauthorized intrusion is detected, comprising:member position detection means which detect the positions of authorized members using said object of security;unauthorized intrusion position detection means which detect the position of said unauthorized intrusion into said object of security;external security surface memory means which store the position of an external security surface;internal security surface memory means which store the position of an internal security surface;execution control means which control the execution of first guard processing or second guard processing on the basis of the positions of said authorized members detected by said member position detection means so that said first guard processing is executed in cases where there are no authorized members inside said external security surface, and so that said second guard processing is executed in cases where said authorized members are present inside said internal security surface; andexecution means which are disposed in a plurality of locations inside said object of security, and which execute said processing with respect to said unauthorized intrusion when the position of said unauthorized intrusion into said object of security is detected by said unauthorized intrusion position detection means in cases where said first guard processing or said second guard processing is executed.
- The security system according to claim 7, characterized in that said first guard processing is caretaker guard processing which is guard processing for said unauthorized intrusion into the inside of said external security surface, and said second guard processing is at-home guard processing which is guard processing for said unauthorized intrusion between said external security surface and said internal security surface.
- The security system according to claim 7, characterized in that said execution means execute said processing that generates white smoke.
- The security system according to claim 7, characterized in that said member position detection means detect the positions of said authorized members by detecting the positions of devices which are mounted on said authorized members, and which transmit by wireless transmission an ID code that corresponds to the object of security.
- The security system according to claim 7, characterized in that said member position detection means detect the positions of said authorized members by detecting the positions of devices which are mounted on said authorized members, which transmit by wireless transmission an ID code that corresponds to the object of security, and on which said execution means are disposed.
- The security system according to claim 11, characterized in that said execution means disposed on said devices execute said processing that generates white smoke.
- A terminal device comprising:an antenna unit;a wireless transmitting and receiving unit which transmits and receives information via said antenna unit;a distance measuring unit which transmits and receives signals modulated by a specified code via said antenna unit and said wireless transmitting and receiving unit, and which measures the distances to devices constituting partners in this wireless transmission and reception;a data communications unit which transmits and receives signals modulated by said code via said antenna unit and said wireless transmitting and receiving unit, and which performs data communications with said devices;an actuator which executes specified processing with respect to unauthorized intrusions; anda control unit which performs overall control.
- The terminal device according to claim 13, characterized in that said actuator executes said processing that generates white smoke.
- The terminal device according to claim 13, characterized in that this device further comprises human body detection means which detect a human body between this terminal device itself and other terminal devices by the waveform analysis of wireless signals between this terminal device itself and the other terminal devices, and said actuator executes said processing for said unauthorized intrusion in cases where said human body detection means detects said human body.
- A terminal device comprising:distance measuring means which measure the distance between the terminal device itself and partners;human body detection means which detect a human body between the terminal device itself and partners by the waveform analysis of wireless transmission signals; andtransmitting means which transmit information indicating the measured distance between the terminal device itself and said partners or information indicating the detection of said human body.
- An information processing method for a terminal device comprising:a distance measurement step in which the distance between said terminal device and a partner is measured;a human body detection step in which a human body between said terminal device and a partner is detected by the waveform analysis of a wireless transmission signal; anda transmission control step in which the transmission of information indicating the measured distance between said terminal device and said partner or information indicating the detection of said human body is controlled.
- A program which is used to cause the computer of a terminal device to perform information processing, comprising:a distance measurement step in which the distance between said terminal device and a partner is measured;a human body detection step in which a human body between said terminal device and the partner is detected by the waveform analysis of a wireless transmission signal; anda transmission control step in which the transmission of information indicating the measured distance between said terminal device and said partner or information indicating the detection of said human body is controlled.
- An information processing device which processes information that is transmitted from a plurality of terminal devices, comprising:distance measuring means which measure the distances from said information processing device itself to said respective terminal devices;receiving means which receive information indicating the distances between said respective terminal devices that is transmitted from each of said terminal devices; andjudgment means which judge whether or not there has been an unauthorized intrusion into the object of security on the basis of the distances from said information processing device itself to said respective terminal devices or the distances between said respective terminal devices.
- The information processing device according to claim 19, further comprising human body detection means which detect a human body between the information processing device itself and said respective terminal devices by the waveform analysis of a wireless transmission signal, characterized in that said judgment means judge whether or not there has been an unauthorized intrusion into said object of security on the basis of the detection of said human body.
- The information processing device according to claim 19, characterized in that the receiving means further receive information indicating the detection of a human body that is transmitted from each of said terminal devices, and said judgment means judge whether or not there has been an unauthorized intrusion into said object of security on the basis of said information indicating the detection of said human body.
- An information processing method which processes information that is transmitted from a plurality of terminal devices, comprising:a distance measurement step in which the distances from the device itself to said respective terminal devices are measured;a reception control step in which the reception of information indicating the distances between said respective terminal devices that is transmitted from each of said terminal devices is controlled; anda judgment step in which it is judged whether or not there has been an unauthorized intrusion into the object of security on the basis of the distances from the device itself to said respective terminal devices or the distances between said respective terminal devices.
- A program which causes a computer to perform information processing that processes information transmitted from a plurality of terminal devices, comprising:a distance measurement step in which the distances from the device itself to said respective terminal devices are measured;a reception control step in which the reception of information indicating the distances between said respective terminal devices that is transmitted from each of said terminal devices is controlled; anda judgment step in which it is judged whether or not there has been an unauthorized intrusion into the object of security on the basis of the distances from the device itself to said respective terminal devices or the distances between said respective terminal devices.
- A vehicle security system comprising:characterized in that the variation in the distances between said fixed terminal devices and said control terminal device disposed inside said vehicle and the distances between said respective fixed terminal devices is monitored when the position of said mobile terminal device is outside an external security surface 22 that is set by said fixed terminal devices and said control terminal device disposed inside said vehicle, and it is judged that an abnormality has occurred in cases where the variation in distance satisfies specified conditions; and specified processing for an unauthorized intrusion is executed in cases where it is judged that an abnormality has occurred.fixed terminal devices which are disposed on the inside surfaces of the respective doors of the vehicle, and which measure the distances to other fixed terminal devices and a control terminal device;a mobile terminal device which is held by a person having authorization to enter and exit said vehicle; anda control terminal device which is disposed inside said vehicle;
- The vehicle security system according to claim 24, characterized in that said processing for an unauthorized intrusion is processing that generates white smoke.
- A network system comprising a plurality of fixed nodes and a control node, characterized in that said fixed nodes [each] comprise sensing means which sense the surrounding environment, first wireless communications means, an actuator which applies an action to the outside, and control means which cause said first wireless communications means to transmit information relating to said surrounding environment sensed by said sensing means to said control node, and which perform a control action so that said actuator is operated in response to commands from said control node, said control node comprises second wireless communications means, and selection means which select said fixed node that are to operate said actuator on the basis of said information relating to the surrounding environment that is received from said fixed nodes, and said second wireless communications means transmit said commands that operate said actuator to said selected fixed node.
- The network system according to claim 26, characterized in that said second wireless communications means receive information relating to said surrounding environment which is information relating to the distances between said fixed nodes that is transmitted from said fixed nodes.
- A three-dimensional coordinate system setting method using a first terminal device, second terminal device, third terminal device and fourth terminal device which are terminal devices comprising an antenna unit, a wireless transmitting and receiving unit that transmits and receives information via the antenna unit, a distance measuring unit that measures the distance to the device constituting the wireless transmitting and receiving partner by transmitting and receiving signals modulated by a specified code via the antenna unit and wireless transmitting and receiving unit, a data communications unit which performs data communications with the devices by transmitting and receiving signals modulated by a code via the antenna unit and wireless transmitting and receiving unit, an actuator which executes specified processing with respect to unauthorized intrusions, and a control unit which performs overall control, this setting method being characterized in that the position of the first terminal device is taken as the origin of the three-dimensional coordinate system, the distance between the first terminal device and second terminal device, the distance between the first terminal device and third terminal device and the distance between the second terminal device and third terminal device are respectively measured, the first axis of the three-dimensional coordinate system is specified by applying a specified mathematical operation to first measurement results indicating the distance between the first terminal device and second terminal device, the distance between the first terminal device and third terminal device and the distance between the second terminal device and third terminal device, the second axis of the three-dimensional coordinate system is specified by applying a specified mathematical operation to these first measurement results, the distance between the first terminal device and fourth terminal device, the distance between the second terminal device and fourth terminal device and the distance between the third terminal device and fourth terminal device are respectively measured, and the third axis of the three-dimensional coordinate system is specified from second measurement results indicating the distance between the first terminal device and fourth terminal device, the distance between the second terminal device and fourth terminal device and the distance between the third terminal device and fourth terminal device, the first axis and the second axis.
- The security surface setting method in said three-dimensional coordinate system set by the setting method according to claim 28, characterized in that the position of a fifth terminal device which is one of said terminal devices in said three-dimensional coordinate system is detected, the smallest rectangular solid in said three-dimensional coordinate system that includes a plurality of said detected positions is determined, and said security surface is set on the basis of the surfaces of said determined rectangular solid.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US45255303P | 2003-03-07 | 2003-03-07 | |
| US452553P | 2003-03-07 | ||
| PCT/JP2004/002819 WO2004079687A1 (en) | 2003-03-07 | 2004-03-05 | Security system, terminal, information processing device and method, program, vehicle security system, network system, and setting method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP1603094A4 EP1603094A4 (en) | 2005-12-07 |
| EP1603094A1 true EP1603094A1 (en) | 2005-12-07 |
Family
ID=32962730
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP04717766A Withdrawn EP1603094A1 (en) | 2003-03-07 | 2004-03-05 | Security system, terminal, information processing device and method, program, vehicle security system, network system, and setting method |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP1603094A1 (en) |
| JP (2) | JP4120840B2 (en) |
| WO (1) | WO2004079687A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ITPR20090015A1 (en) * | 2009-03-17 | 2010-09-18 | Gruppolicromatico Di Rizzieri Massi Mo & C S N C | ANTI-INTRUSION SYSTEM |
| ES2359537A1 (en) * | 2009-09-23 | 2011-05-24 | Jose Ramon Gordejuela Menocal | Security system against attractions and/or intrusions in a local. (Machine-translation by Google Translate, not legally binding) |
| GR20170100142A (en) * | 2017-04-03 | 2019-01-25 | Παναγιωτης Αθανασιου Πελεκασης | Remote surveillance system with wired- or wirelessly-actuated devices deterring any illegal entry in guarded spaces |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007058302A1 (en) | 2005-11-21 | 2007-05-24 | Nec Corporation | Position estimating system, position estimating method, position estimating device and its program |
| JP2018097655A (en) * | 2016-12-14 | 2018-06-21 | 株式会社デンソーウェーブ | Security system |
| JP7149740B2 (en) * | 2018-06-20 | 2022-10-07 | 三菱電機株式会社 | Cargo collapse prediction system, cargo collapse prediction device, and method thereof |
| RU2741380C1 (en) * | 2020-06-26 | 2021-01-25 | Александр Николаевич Смирнов | System for monitoring an arming object |
| IT202100029390A1 (en) * | 2021-11-19 | 2023-05-19 | Tek Group S R L | FOG DEVICE AND METHOD FOR CONTROLING A SAFETY SYSTEM INCLUDING A FOG DEVICE. |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1983001855A1 (en) * | 1981-11-19 | 1983-05-26 | Minnesota Mining & Mfg | Optically based intrusion detector |
| JPH04102682A (en) * | 1990-08-22 | 1992-04-03 | Hitachi Ltd | Valuables housing room and its keeping system |
| JP3020335B2 (en) * | 1991-12-27 | 2000-03-15 | セコム株式会社 | Anti-theft system |
| JP3132937B2 (en) * | 1993-01-14 | 2001-02-05 | セコム株式会社 | Anti-theft device |
| JPH09180070A (en) * | 1995-12-22 | 1997-07-11 | Ohbayashi Corp | Security system |
| JP3764265B2 (en) * | 1997-12-16 | 2006-04-05 | 富士通株式会社 | Image monitoring device |
| JP4006844B2 (en) * | 1998-09-01 | 2007-11-14 | 日本ビクター株式会社 | Monitoring system |
| JP2001014558A (en) * | 1999-06-30 | 2001-01-19 | Victor Co Of Japan Ltd | Crime prevention device for cash transporting car |
| JP4527836B2 (en) * | 2000-03-30 | 2010-08-18 | 綜合警備保障株式会社 | Security system using power line carrier and its repeater |
| JP2001307251A (en) * | 2000-04-21 | 2001-11-02 | Fenwall Controls Of Japan Ltd | Monitoring system for cash pot |
| JP2001355361A (en) * | 2000-06-13 | 2001-12-26 | Nakamura Gijutsu Kenkyusho:Kk | Guard device |
| AU2001276373A1 (en) * | 2000-07-03 | 2002-01-14 | Ecole Polytechnique Federale De Lausanne (Epfl) | Method and wireless terminal for generating and maintaining a relative positioning system |
| JP2003051075A (en) * | 2001-07-18 | 2003-02-21 | Nippon Advantage Corp | Device for deciding suspicious person |
| JP2003067869A (en) * | 2001-08-29 | 2003-03-07 | Chuo Electronics Co Ltd | Device for managing entrance and exit |
| JP2003288657A (en) * | 2002-03-28 | 2003-10-10 | Sanyo Electric Co Ltd | Monitoring sensor system |
-
2004
- 2004-03-05 JP JP2005503123A patent/JP4120840B2/en not_active Expired - Fee Related
- 2004-03-05 WO PCT/JP2004/002819 patent/WO2004079687A1/en not_active Ceased
- 2004-03-05 EP EP04717766A patent/EP1603094A1/en not_active Withdrawn
-
2008
- 2008-03-06 JP JP2008056022A patent/JP4752854B2/en not_active Expired - Fee Related
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ITPR20090015A1 (en) * | 2009-03-17 | 2010-09-18 | Gruppolicromatico Di Rizzieri Massi Mo & C S N C | ANTI-INTRUSION SYSTEM |
| ES2359537A1 (en) * | 2009-09-23 | 2011-05-24 | Jose Ramon Gordejuela Menocal | Security system against attractions and/or intrusions in a local. (Machine-translation by Google Translate, not legally binding) |
| GR20170100142A (en) * | 2017-04-03 | 2019-01-25 | Παναγιωτης Αθανασιου Πελεκασης | Remote surveillance system with wired- or wirelessly-actuated devices deterring any illegal entry in guarded spaces |
Also Published As
| Publication number | Publication date |
|---|---|
| JP4120840B2 (en) | 2008-07-16 |
| JPWO2004079687A1 (en) | 2006-06-08 |
| WO2004079687A1 (en) | 2004-09-16 |
| JP2008146683A (en) | 2008-06-26 |
| EP1603094A4 (en) | 2005-12-07 |
| JP4752854B2 (en) | 2011-08-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11527149B2 (en) | Emergency alert system | |
| US11024105B1 (en) | Safety and security methods and systems | |
| US10147295B2 (en) | Personnel tracking and monitoring system and method employing protective gear including a personnel electronic monitor device | |
| US10692024B2 (en) | Wireless mesh network system for monitoring worksite events including detecting false events | |
| KR101910480B1 (en) | Closed-space monitoring system based on IoT network | |
| US10854058B2 (en) | Emergency alert system | |
| JP4752854B2 (en) | Network system, control node, fixed node, information processing method, and program | |
| US20180151037A1 (en) | System and interfaces for managing workplace events | |
| KR100767065B1 (en) | Remote probation system and method | |
| US11810032B2 (en) | Systems and methods for low-energy wireless applications using networked wearable sensors | |
| US20120047083A1 (en) | Fire Situation Awareness And Evacuation Support | |
| EP3933794A1 (en) | Accurate digital security system, method, and program | |
| US7012524B2 (en) | Anti-intruder security system with sensor network and actuator network | |
| KR20120052330A (en) | Control and monitoring method | |
| US11551543B2 (en) | Safety monitoring system | |
| JP6172958B2 (en) | Shooting system | |
| JP2007122528A (en) | Node management system and node management program | |
| JP2022177446A (en) | Security system, mobile terminal, and program | |
| EP3989195A1 (en) | System and method for automatically disarming an intrusion detection system | |
| US20100283608A1 (en) | Intrusion Warning and Reporting Network | |
| JP5411744B2 (en) | Security system | |
| CN107105411A (en) | A kind of mobile intelligent terminal track monitoring system and method based on intelligent switch panel | |
| JP2007150435A (en) | Communication system | |
| JP7152346B2 (en) | Security system | |
| JP7138007B2 (en) | Construction site monitoring system and monitoring method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20041115 |
|
| A4 | Supplementary search report drawn up and despatched |
Effective date: 20050530 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
| DAX | Request for extension of the european patent (deleted) | ||
| 17Q | First examination report despatched |
Effective date: 20070730 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20071211 |