专利摘要:
Security and surveillance system based on intelligent mobile devices of the type of devices capable of communications to an extensive network, such as the internet or telephony, which have the capacity to load and execute an operating procedure in the form of a downloadable module or application and which can be have services such as a camera, gps; for example: smartphones, tablets, gps, etc .; wherein said module incorporates procedures for enabling and making telephone services accessible and bidirectional communication with a remote control center, via the internet; incorporating in this module or modules different security procedures that link the device with a security database with geolocated data that adapt the response to the emergencies produced. (Machine-translation by Google Translate, not legally binding)
公开号:ES2543620A1
申请号:ES201400046
申请日:2014-01-20
公开日:2015-08-20
发明作者:Fernando Jorge OLIVARES ARNAIZ
申请人:Fernando Jorge OLIVARES ARNAIZ;
IPC主号:
专利说明:

SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES
FIELD OF THE INVENTION
The present invention develops a security and surveillance system based on intelligent mobile devices, that is, mobile phone devices, smartphones, tablets, etc., which have a camera, GPS, integrated microphone and communication at a
10 extensive network such as Internet or mobile telephony, in which said devices are integrated into a centralized security system.
BACKGROUND
15 Security alarms establish a secure perimeter with a means of detection in which when said perimeter is broken the alarm is activated. These types of systems have traditionally presented the problem of false positives, so that the technique has evolved
20 incorporating surveillance cameras as detection and verification elements so that remote monitoring determines whether an emergency situation really exists or not.
25 There are numerous monitoring and security applications that use fixed cameras, connected by cable or by wireless means, associated in a closed video circuit that is well monitored from a centralized monitor or group of monitors that receives
30 said signals, or remotely from a remote control center that receives that signal transmitted from a transmitter module of said video signals.
In these systems, expensive and expensive equipment
installation, the parameters of its operation come
conditioned by the same hardware structure
S installed and its operating characteristics.
Ready video surveillance cameras are also known
to get connected to a local network, type TCP / IP, by
a WI FI or cable transmission. These units send
10 your images to a central unit that manages the
alarm operating procedures that
it may eventually be linked to a center of
remote security that manages said system of
security .
fifteen
These network linked camcorder systems are
also known without a private security server. The
central unit in these cases sends the images to a
own server or to a public image mailbox, such as
twenty a WebCam, you can even send an SMS message to
user, so you can verify the situation to
control
In practice, such systems remain expensive
25 both to install and configure as per the equipment
involved They are also not very flexible because their
functions are set in advance and both the
user as the security center, simply the
use, requiring a complex change of equipment to
30 Adjust its functionality.
The present invention has as one of its main objectives the use of the numerous mobile phones that exist in the market and held by users, with camera, to establish a system of
5 security and economic video surveillance, adjustable to different user needs and efficient in terms of performance.
It is also one of the main objectives of the
10 present invention that said personal mobile phone network can be integrated into a centralized and monitored surveillance system.
Another object of the present invention is that the
15 procedures included in this system are configured in modules that users can download from the Internet, from a website or from an Application Server to adapt their security system to their needs.
Thus, another of the main objectives of the present invention is the ease of adapting the devices used to their function by means of methods that can be downloaded in the form of modules. This is the
25 possibility of configuring the system and the devices, being able to alter said configuration data.
Another objective of the present invention is to allow the incorporation into a security system of 30 heterogeneous products due to their functionality: mobile phones or tablets, etc .; also heterogeneous as
to your operating operating system: Android, Blackberry, lOS, Symbian, etc.
It is also another of the main objectives of the
5 present invention that said devices are integrated into a security system associated with a mobility situation of the user who uses them, consequently being configured as a personal security advisor or device in travel and travel.
These and other objects of the present invention will be more apparent throughout the description that follows.
BRIEF EXPLANATION OF THE INVENTION The present invention describes a security system based on smart mobile devices, for example, mobile phone devices, smart phones, tablets, etc. , which have a camera and
20 wireless communication to an extensive network such as the Internet
or mobile telephony, in which said devices by means of a downloadable module adopt the functionalities of a terminal with security and surveillance functions.
25 This module incorporates the procedures for converting the camera or cameras of the mobile device into a video surveillance camera, including the ability to operate different security procedures typical of the
The present invention, as will be explained in detail below, as well as the possibilities of linking
external of said surveillance terminal or terminals,
as appropriate, to an extensive network such as the Internet.
In one of the possible preferred embodiments of the
5 invention, different mobile phones are located in
positions selected by the user, each of
them using the system procedures of the
invention These procedures included in a module
built into these phones, enable cameras
10 of photos of said devices in detecting cameras of
movement, allow video recording, 'audio
and take snapshots not only on demand, but
in response to the motion detection of your area of
vision .
lS
All these now surveillance terminals can
link to another terminal that acts as a central and
communications center with a security center
remote, through secure communication protocols that
twenty identify the content of the information and its origin
in accordance with the standards of the communication technique
and data encryption.
The existing procedures in the system activate the
25 communication and remote control of said terminals that
can record video, audio and take snapshots
photographic, and even emit sound warning signals
and / or lighting. Alarms can be linked to the system
conventional sound or other media, spotlights, objects
30 mobiles, etc., that are triggered by order of the center of
security or automatically when fulfilled
certain assumptions valued as intrusion and of
security breach. This system also allows the
Event recording as a preventive form of security.
The versatility of the present invention allows it
5 display its advantages in mobility situations of the
user, of the mobile device, so that
procedures incorporated in this system
they allow this to be a true security advisor
travel and travel staff, warning of crossing
10 from a dangerous area, informing how to access
help as quickly as possible, alerting
upcoming security services, activating alerts from
civil protection for local emergency states or
national, etc
lS
In this way all the objects have been obtained
pursued by the invention allowing the creation of
a security and surveillance system taking advantage of
Media and telephone devices
twenty mobile, even in disuse, with a very
satisfactory in terms of efficiency, in a system
adjustable to individual needs, being in
set of reduced economic cost.
2S DETAILED EXPLANATION OF THE INVENTION
The present invention consists of a system of
security based on smart mobile devices,
for example mobile phone devices, phones
smart, tablets, etc , which have
30 communication to an extensive network such as the Internet or
mobile telephony, of different services as per
example those of a camera of fo coughs, etc. , in which said
Devices are integrated into a centralized Security System.
When the present invention refers to devices
5 smart phones are referring to mobile devices, mainly mobile phones, which include access to an extensive network, such as the Internet or a mobile phone network, with different services, such as those of one or several cameras,
10 GPS, etc. This includes tablets with a camera or other similar devices that incorporate communications, a camera and the ability to receive operating instructions through a downloadable program module.
15 In an example of practical implementation, from a mobile phone with a camera, it is downloaded from it, via a web service for downloading applications or from a pe and transferring it to the phone, a module
Downloadable incorporating the methods of the system of the present invention. The phone is placed with the camera focused on the surveillance zone, activating said module that through the built-in options establishes the relationship with a data center.
25 safety control and its operating parameters.
The aforementioned downloadable module incorporates an API (Application Programming Interface) of security functions with an interface for each
30 host operating system, with a view to facilitating the operation and maintenance of system procedures. Obviously, the methods of
system of the invention in a specific program for each telephone platform, but this does not substantially alter the procedure for the purposes of the present invention.
5 The procedures included in the aforementioned module include: -activation of telephone communications to make it accessible and activate or deactivate its functions
10 r emotamente, as well as to receive the information captured by said mobile in its different services: camera, sound, etc.
motion detection via detection of a sufficient modification of the pixel map of the image 15 captured by the camera or cameras of the phone
procedures for compression of the information to be transmitted and for decompression of the information received, in order to decrease the amplitude of the data band used in the transmission of
20 information; this includes the encryption of said information by means of a secure encryption, in accordance with the technique, which identifies the equipment that emits the information and validates said information, -the authorization of other functionalities or services
25 existing in said telephone or mobile device, such as a flash light, the loudspeakers of the telephone, a GPS, etc., depending on the nature and performance of each device and the safety procedure used.
30 Thus, the user can use old and disused mobile phones, tablets, etc., to
Set up a safety net. You can even decide
at each moment the number of devices you will use
in this task and its location. For example, while
sleep you can use your favorite tablet to monitor
S an area of your house or garden and the next day
disconnect it from the safety net and take it away
I get to work.
The possibilities offered by the present invention are
10 exceptional, considering the proliferation of
mobile and smart devices incorporating a
Photo camera exists in many modern homes.
In addition to the system of the invention,
lS get great control over the parameters and means
of security in the hands of the end user, who can choose
by different security companies offering a
central security service within the parameters
of the present invention without that variation of
twenty centralized security provider represent the
modification of all its equipment and a high
investment associated with each change of provider.
Moreover, the present invention by modules
2S suitable downloadable allows you to configure different
security environments using mobile devices,
allowing for example to dispense with the server
centralized security and that is the user
who exercises this role, for example receiving all the
30 security alerts to a web page, via messaging
Instant, such as SMS, or sending data to your phone
staff, even with the proper procedures can
Access the display and control functions of your devices from your phone
security located in your home.
5 All this is possible thanks to the fact that the present invention, in fact, represents an incorporation of flexibility, via downloadable security procedures in program modules with respect to the previous technology where hardware and procedures
10 (software) were strongly related.
The solution that the present invention represents is feasible because there is a large number of mobile phones and other smart devices held by the users that can be used to establish a safety net based on them. In addition, the aforementioned devices are programmable and can, via said programs, make their physical functions accessible, such as the camera, or the sound according
20 to the specifications of your operating system.
In practice, said operating system of each device (Android, Symbian, Blackberry, ros, Windows, etc.), incorporates the means and / or functions to access the phone's features. A simple solution, although not the only one, is to create an interface between each API of each family of phones with the functionalities
or own API that gathers the procedures of the present invention, in this way said own procedures
30 are common to all platforms and only the adaptation or translation to each family of products should be modified. This functional specialization allows
Optimally distribute the work between computer and security professionals to configure the system for each case of practical realization.
In another of the possible and main cases of practical embodiment of the present invention the system is configured for situations with device displacement. The procedures incorporated in the present invention allow to adapt to this situation and
10 Set up as a personal security advisor.
Specifically, as in the previous case of preferred embodiment, the application or module downloaded in the device allows a center of
15 control or security center can access the functions or services of the telephone. In this way different situations can occur when the user enrolled in the system and using the methods of the invention activates different security services.
The invention allows security procedures to be deactivated and there is no monitoring of the device states. The invention incorporates an activation process of the emergency and / or alarm procedures by pressing an activation button of said procedures, said "SOS" icon / button arranged on the screen of the device which can advantageously be a touch screen . The invention provides a double check of the activation of the "SOS" button, for example, by requesting a second press on the device.
The invention provides for other means of activating emergency procedures other than the use of the SOS button. In this way, the system of the invention 5 contemplates configuration conditions in which the disconnection of the connector cable from the headphones acts as a virtual micro switch. When the headphone cable is disconnected, a countdown preset by the user would be activated and if not deactivated
10 through a secret code, it would send the SOS signal to the server.
In another of the procedures provided for by the invention, for example in driving situations, another possible method of activating the emergency situation alarm is a sudden and sudden deceleration of the vehicle, measured by inertia sensors in the device or through GPS geolocation measurements, which would indicate
20 that a traffic accident has been suffered, so that the signals and procedures corresponding to that emergency would be emitted.
Different degrees of monitoring of the
25 device with specific services attributed to each of said monitoring levels. For example, GPS tracking and security messages via instant messaging, or otherwise active monitoring, for example when the user
30 activates this state because he feels that he is being followed or that he is in danger or because he is crossing an area especially compromised in terms of security, etc.
In general, the present invention incorporates into the module or application that is downloaded to the device and executed therein, a set of steps that
5 include: -the enablement of the services available on said devices: the camera or cameras, the flash, the GPS, microphone and speakers, etc. -the means to enable the camera or cameras
10 of the devices such as surveillance cameras with video motion detection
The procedures allow two-way communication between said devices and at least one control center.
15 -said communication may include recorded images of video, photo snapshots, sound, voice and instructions for action on the services available on the device -such compressed and encrypted communication, encrypted
20 with seal of origin and content according to known technique
an operating procedure that relates the geollocation of the device to a security database of geographic locations, determining
25 closest locations of service centers related to an emergency according to each type of emergency
said location of the device collated with a hierarchy of geolocated security levels located
30 in said Security Database, depending on the type of emergency and depending on the season, day of the week and time of day
the assessment of the emergency by said
control center and its typing
action instructions on the services of
said device in response to the situation of
S previously determined emergency.
The system of the invention establishes a network of
local security linking different units of said
mobile devices, each configured of
10 according to claim 1 by means of said module
or application, where each element of said identification is identified
security network with a registration ID, and
operating the control center with each of said
dispositives .
fifteen
At least one of said control centers may be
a remote center linked via the Internet or another network
extensive, such as mobile telephony (GSM, 3G, 4G, etc.).
twenty In response to an emergency situation said center
Control orders video recording, socket
photographs, send acoustic messages and / or activate others
security elements existing in said local network of
security, such as alarms, lights, etc.
25
When an emergency situation occurs, both in
the first case of local fixed security network, as in
the case of a user moving with a device
mobile security, a set of
30 procedures
Application No. P20 1 400046 F.Ercctiva 01/20/2014F.OEPM 01/20/2014
lS
5 an operating procedure that relates the geolocation of the device to a security database of geographic locations, determining the closest locations of the service centers related to an emergency according to each type of emergency
10 -the assessment of the location area of the device according to its danger according to said Safety Database and the type of emergency
the control center assessment of the emergency and its typificationbypartfromsaying
fifteen operating instructions on said device in response to an emergency determined previously.the theservices situationof of
20 25 Once the emergency type or alarm has been established by said control center, a list of actions that are preconfigured in a Security Database that relates the type of emergencies, geographical situations and actions to be carried out are executed. These actions include communication with the user and the transmission of instructions on their screen related to the emergency produced.
Since hepointfromviewfromthereplytoasituation
30 emergency or security, the potential that the present invention allows to use and existing in the enablement of the device are enormous
smart mobile. From calling the user to accurately calibrate the emergency situation, give recommendations and / or offer an action to follow, etc.
5 Voice messages and device flash light activations, audible alarms, etc., can be used according to the services available on each device.
The invention also provides for activation and
10 operation of other devices linked to the local security network and accessible via WIFI or other communication protocol and an interface gateway to it. This allows, for example, the activation and deactivation of a conventional alarm or any
15 another electronically controlled device, such as house lights controlled via a home automation interface, TV or the movement of a radio controlled object.
The actions included in the present invention provide for the possibility of simulation of the device malfunction, so that even if it seems inoperative it continues to offer data on its location, even transmission of images and sound. This, no doubt, can
25 offer numerous advantages for the follow-up of, for example, an emergency associated with a crime, where it can facilitate the detention of criminals.
Another of the procedures included in the system of
The present invention is to use the recording media of the cameras as video prevention, so that if the user needs to register images in a manner
Instant and preventive on a fact that could be eventual and counterproductive, a sequence of recording of images would be initiated that would be automatically uploaded to the server, if later use were necessary.
In fact, the invention contemplates different levels of administration or central supervision service. According to this conception the invention allows an intermediate category of administration centers or of
10 administrators, located between the individual device or the local security network and the centralized control and security center. This links a user or a group of users to a category of "super administrator" in front of other users, by
15 example to configure and establish a geographical area
or distance in reference to other users, which allows that in the event that other users move away from that area or group, or exceed that distance, the system will send a warning to said super administrator,
20 warning that a member has separated from the group and if he is in an area with a certain level of risk.
Finally, the Security Database to n tes
25 mentioned, contains security geolocation data linking geographic locations, streets, city addresses, etc. , with a pre-established security hierarchy that discriminates locations based on their danger,
30 consideringblissdangertooinfunctionfromthe
station of year,dayfromtheweekYfromthehourof theday .
The BasefromDatafromsecuritystorefromshape
geolocatable, for example in KML or similar data, said security assessments.
In this way, when a device enters, via its
5 communication possibilities, its geographical location in the system, sending it to the centralized control center, is automatically checked against its security hierarchy, activating the corresponding safety functions associated with said danger.
10 This is of paramount importance to execute the safety recommendation function or actions to be taken in the event of a danger forecast. This way of having structured security information allows
15 an immediate and automatic response of the system, which alleviates possible transmission delays between the units involved, and provides information and actions to be carried out in real time.
20 A case of practical realization of this function would be represented by a user who visits a city that does not know, said city included in the Database of the present invention and mapped in the security hierarchy of the present system. When the user by
The prevention function activates the security tracking function of the present invention, for example, is informed at the time of the potential security risk situation that it is experiencing according to the place where it is located, it can even receive a message in the form of
30 recommended route and the routes to avoid. This planning feature could not be offered in real time without
Access to information in the Database of
characteristic safety of the present invention.
Naturally, many other functions of
S security that general online benefit from the
Security Database with geolocated data from
the present invention, which take advantage of the speed of
obtaining geolocated information characteristic of
The present invention.
10
The system of the invention, therefore, is susceptible to
adopt different realization cases and attend to very
different security demands, practically through
the incorporation of common procedures, via a
lS downloadable application and optionally, in modules
accessory procedures incorporate performance
additional specific to particular situations
concrete.
twenty The system is therefore very versatile and efficient, with costs
very reduced application, while offering
innovative security features that do not
currently exist or can only be implemented
with expensive equipment and services dedicated to the
25 security .
It is understood that they fall within the
invention those alterations of finish and form that
Do not alter the essence of it.
30
权利要求:
Claims (6)
[1]
1.-SECURITY AND SURVEILLANCE SYSTEM BASED ON INTELLIGENT MOBILE DEVICES of the type of 5 devices capable of communicating to an extensive network, such as the Internet or telephony, which have the capacity to load and execute an operating procedure in the form of a module or application downloadable and that has services such as, for example, a camera
10 of photos and GPS, being of the type of devices such as for example smartphones, tablets and GPS, CHARACTERIZED because said module or application comprises -the enablement of the services available in said
15 devices: for example, camera or cameras, flash, GPS, microphone and speakers,
the procedures that allow establishing bi-directional communication between said devices and at least with a control center,
20-an operating procedure that locates the location of the device in a Geographic Security Database; If you have a geographic security database that includes an assessment of
25 danger for each geographical position and type of emergency, according to a pre-established orderly hierarchy, depending on the season of the year, day of the week and the time of day.
30 2. - SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to the
 N "F.Efccti application, 'to F.OEPM
 11/12/2014 12/12/2014
5 claim 1, CHARACTERIZED in that said Security Database has action instructions on the services of said device in response to the emergency situation, determining the actions of said control center.
10 3. SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to claims 1 and 2, CHARACTERIZED because the means are available to enable the camera or cameras of said devices as surveillance cameras with video motion detection.
15 20 4. DEVICE SYSTEM SECURITY AND SURVEILLANCE BASED ON MOBILE previous, INTELLIGENT, CHARACTERIZED according to why said communication between said mobile devices and said control center includes recorded video images, photographic snapshots, sound, voice and action instructions on the services available on the device.
2S 5. S I STEMA DEVICES vindication of SAFETY AND SURVEILLANCE communication based on previous MOBILE, INTELLIGENT, CHARACTERI ZED according to why the said is compressed and encrypted, being coded with seal of origin and contained according to the known technique.
30 6. SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to the preceding claims, CHARACTERIZED because
establishes a local security network linking different units of said mobile devices, each configured according to claim 1 by means of said module or application, where
5 identifies each element of said safety net witha registration ID and operating at leastwith a control center.
7, - SECURITY AND SURVEILLANCE SYSTEM BASED ON
10 SMART MOBILE DEVICES, according to theprevious claim, CHARACTERIZED because whenminus one of these control centers is a centerRemote linked via Internet.
15 8, - SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to any one of the preceding claims, CHARACTERIZED because it contemplates different levels of administration or central supervision service, so that it can
20 linking a user or a group of users to a category of "super administrator" in front of other users, for example to configure and establish a geographical area or distance in reference to other users, creating for example a security alert
25 when other users move away from that area or exceed that distance.
9, - SECURITY METHOD AND SURVEILLANCE BASED ON
SMART MOV ILES DEVICES, according to the system of
Any one of claims 1 to 8, CHARACTERIZED because it includes an alarm and / or emergency activation procedure.
10-SECURITY AND SURVEILLANCE METOOO BASED ON
SMART MOBILE DEVICES, according to the
previous claim, CHARACTERIZED because said
5 Activation of the alarm and emergency procedures occurs by pressing an "SOS" button / icon on the screen of one of these devices, such as on a touch screen.
10 11. SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to claim 9, CHARACTERIZED because said activation of the alarm and emergency procedures require a double verification control requesting a second
15 press on the device.
[12 ]
12. - SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said activation of the alarm and emergency procedures is produced by disconnecting the connector cable of the headphones that acts as a virtual micro switch, so that when the headphone cable is disconnected, a countdown is activated, preset by the
25 user, which if not deactivated by a secret code would send the SOS signal to said control center.
[13]
13.-SECURITY AND SURVEILLANCE METHOD BASED ON
30 SMART MOBILE DEVICES, according to claim 9, CHARACTERIZED because said activation of the alarm and emergency procedures occurs,
 N "application F. Effective F.OEPM
  11/12/2014 12111/2014
24
in situations of driving a vehicle, by capturing a sudden and sudden decrease in speed, obtained from said device, in which case the signals and procedures are emitted
5 corresponding to a traffic accident emergency.
[14 ]
14. -THE SECURITY METHOD AND VIGILANC I BASED ON
 SMART MOBILE DEVICES, according to any one
10 of claims 9 to 13, CHARACTERIZED in that said Security Database relates type of emergencies, geographical situations and pre-configured actions to be performed.
15 15.-SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said actions include communication with the user and the transmission of instructions on their related screen
20 with the emergency produced.
[16 ]
16. -THE SECURITY AND SURVEILLANCE METHOD BASED ON
SMART MOVI LES DEVICES, according to the
previous claim, CHARACTERIZED because said
25 actions include, for example, voice messages, device flash light activations and audible alarms, according to the services available on each device.
30 17. - SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said
Actions include non-operating device simulation procedures and / or shutdown, so that even if it seems inoperative it still offers data on its location, including transmission of images and sound.
5 18.-SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said actions include using the recording means of
10 cameras as video prevention, so that a recording sequence of images that are automatically uploaded to the server is started.
[19 ]
19. -SECURITY AND SURVEILLANCE METHOD BASED ON
15 INTELLIGENT MOBILE DEVICES, according to claim 9, CHARACTERIZED in response to an emergency situation said control center orders the recording of video, taking pictures, sends acoustic messages and / or activates other elements of
20 security existing in said local security network, such as alarms, lights, etc.
类似技术:
公开号 | 公开日 | 专利标题
ES2543620A1|2015-08-20|Security and surveillance system based on smart mobile devices |
ES2665957T3|2018-04-30|Apparatus and method to initiate and share information about incidents in a communication system
US9405360B2|2016-08-02|IP camera smart controller
KR101610026B1|2016-04-07|The hybrid security streetlamp system
CA2829329A1|2011-09-29|System and apparatus for locating and surveillance of persons and/or surroundings
US20130329047A1|2013-12-12|Escort security surveillance system
JP2007072622A|2007-03-22|Notification device of crime prevention state, notification method of crime prevention state, offering device of crime prevention state, and computer program for making computer perform notification method of crime prevention state
KR101562870B1|2015-10-29| The Argos tower and Argos system offering a cctv monitor for anti-crime and anti-disaster with wi-fi direct service
KR101654181B1|2016-09-22|A security closed circuit television emergency call bell system using smart phone apps and smart tags
KR101137451B1|2012-04-20|Intelligent Image Tracking Method
CA3031791A1|2018-02-01|Security monitoring system and methods
KR101617342B1|2016-05-02|Application for caring children and method for operating the same
ES2728511T3|2019-10-25|System and method to control security systems
KR101995028B1|2019-10-01|user safety map providing method for personal safety
KR101493399B1|2015-02-16|Near Offender Alarm System and Control Method of the Server in it
KR20110035420A|2011-04-06|Methods of notifying danger using sensor
KR101855847B1|2018-05-10|System for disaster information delivery
KR101398839B1|2014-05-27|Method for taking a picture of a subject using a smart phone gps connected to a network cctv
KR101401299B1|2014-05-30|Method for taking a picture of a subject using a smart phone gps connected to network cctvs
KR20160010633A|2016-01-27|Invader Monitoring and Alarm System using Thermal Image Fusion Camera
KR101508934B1|2015-04-08|Electronic anklet approach alarm system
KR20160017861A|2016-02-17|System and method for providing safety keeper service
EP3440647B1|2019-08-14|Method for the remote monitoring of persons through smart mobile terminals and web services
WO2014198970A1|2014-12-18|Theft detection and alarm apparatus coordinated with other similar devices
US20170347025A1|2017-11-30|User-wearable type photographing device
同族专利:
公开号 | 公开日
US20160343238A1|2016-11-24|
US10062267B2|2018-08-28|
ES2543620B1|2016-05-31|
WO2015107239A1|2015-07-23|
EP3098794A1|2016-11-30|
EP3098794A4|2016-12-21|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US7221928B2|2003-10-01|2007-05-22|Laird Mark D|Mobile emergency notification system|
US8624727B2|2008-01-28|2014-01-07|Saigh And Son, Llc|Personal safety mobile notification system|
US8559914B2|2008-01-16|2013-10-15|M. Kelly Jones|Interactive personal surveillance and security system|
US8467768B2|2009-02-17|2013-06-18|Lookout, Inc.|System and method for remotely securing or recovering a mobile device|
US8676151B2|2010-10-19|2014-03-18|Guardity Technologies, Inc.|Detecting a transport emergency event and directly enabling emergency services|
US8538374B1|2011-12-07|2013-09-17|Barry E. Haimo|Emergency communications mobile application|
EP2613575A1|2012-01-09|2013-07-10|SJB Computer Consultants Ltd.|A method of operating a mobile communication device|
WO2013173079A1|2012-05-16|2013-11-21|Innovate, Inc.|Ecg-enabled personal emergency response systems|US10192413B1|2015-10-26|2019-01-29|Innotech Security, Inc.|Theft deterrent surveillance system|
US20180182214A1|2016-12-22|2018-06-28|Mivalife Mobile Technology, Inc.|Mobile Device Security System|
CN106791168A|2017-01-13|2017-05-31|北京奇虎科技有限公司|Information of mobile terminal guard method, device and mobile terminal|
CN107564252A|2017-08-16|2018-01-09|武汉协鑫新能源电力设计有限公司|A kind of intelligent alarm and rescue system and method|
ES1231283Y|2019-02-20|2019-09-09|Albert Manuel Huesca|Personal security system consisting of two groups of devices and receivers of information and alarms|
CN111489518B|2019-12-28|2021-11-23|上海申朴网络科技有限公司|Instant alarm system based on state detection|
US20210204094A1|2019-12-31|2021-07-01|Micron Technology, Inc.|Tracking wireless peripheral devices|
法律状态:
2016-02-04| PC2A| Transfer of patent|Owner name: DR.SECURITY S.L. Effective date: 20160129 |
2016-05-31| FG2A| Definitive protection|Ref document number: 2543620 Country of ref document: ES Kind code of ref document: B1 Effective date: 20160531 |
2020-09-22| FD2A| Announcement of lapse in spain|Effective date: 20200922 |
优先权:
申请号 | 申请日 | 专利标题
ES201400046A|ES2543620B1|2014-01-20|2014-01-20|Security and surveillance system based on smart mobile devices|ES201400046A| ES2543620B1|2014-01-20|2014-01-20|Security and surveillance system based on smart mobile devices|
US15/112,601| US10062267B2|2014-01-20|2015-01-20|Security and surveillance system based on smart phone devices|
EP15737618.7A| EP3098794A4|2014-01-20|2015-01-20|Security and surveillance system based on intelligent mobile devices|
PCT/ES2015/000007| WO2015107239A1|2014-01-20|2015-01-20|Security and surveillance system based on intelligent mobile devices|
[返回顶部]