![]() Security and surveillance system based on smart mobile devices (Machine-translation by Google Transl
专利摘要:
Security and surveillance system based on intelligent mobile devices of the type of devices capable of communications to an extensive network, such as the internet or telephony, which have the capacity to load and execute an operating procedure in the form of a downloadable module or application and which can be have services such as a camera, gps; for example: smartphones, tablets, gps, etc .; wherein said module incorporates procedures for enabling and making telephone services accessible and bidirectional communication with a remote control center, via the internet; incorporating in this module or modules different security procedures that link the device with a security database with geolocated data that adapt the response to the emergencies produced. (Machine-translation by Google Translate, not legally binding) 公开号:ES2543620A1 申请号:ES201400046 申请日:2014-01-20 公开日:2015-08-20 发明作者:Fernando Jorge OLIVARES ARNAIZ 申请人:Fernando Jorge OLIVARES ARNAIZ; IPC主号:
专利说明:
SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES FIELD OF THE INVENTION The present invention develops a security and surveillance system based on intelligent mobile devices, that is, mobile phone devices, smartphones, tablets, etc., which have a camera, GPS, integrated microphone and communication at a 10 extensive network such as Internet or mobile telephony, in which said devices are integrated into a centralized security system. BACKGROUND 15 Security alarms establish a secure perimeter with a means of detection in which when said perimeter is broken the alarm is activated. These types of systems have traditionally presented the problem of false positives, so that the technique has evolved 20 incorporating surveillance cameras as detection and verification elements so that remote monitoring determines whether an emergency situation really exists or not. 25 There are numerous monitoring and security applications that use fixed cameras, connected by cable or by wireless means, associated in a closed video circuit that is well monitored from a centralized monitor or group of monitors that receives 30 said signals, or remotely from a remote control center that receives that signal transmitted from a transmitter module of said video signals. In these systems, expensive and expensive equipment installation, the parameters of its operation come conditioned by the same hardware structure S installed and its operating characteristics. Ready video surveillance cameras are also known to get connected to a local network, type TCP / IP, by a WI FI or cable transmission. These units send 10 your images to a central unit that manages the alarm operating procedures that it may eventually be linked to a center of remote security that manages said system of security . fifteen These network linked camcorder systems are also known without a private security server. The central unit in these cases sends the images to a own server or to a public image mailbox, such as twenty a WebCam, you can even send an SMS message to user, so you can verify the situation to control In practice, such systems remain expensive 25 both to install and configure as per the equipment involved They are also not very flexible because their functions are set in advance and both the user as the security center, simply the use, requiring a complex change of equipment to 30 Adjust its functionality. The present invention has as one of its main objectives the use of the numerous mobile phones that exist in the market and held by users, with camera, to establish a system of 5 security and economic video surveillance, adjustable to different user needs and efficient in terms of performance. It is also one of the main objectives of the 10 present invention that said personal mobile phone network can be integrated into a centralized and monitored surveillance system. Another object of the present invention is that the 15 procedures included in this system are configured in modules that users can download from the Internet, from a website or from an Application Server to adapt their security system to their needs. Thus, another of the main objectives of the present invention is the ease of adapting the devices used to their function by means of methods that can be downloaded in the form of modules. This is the 25 possibility of configuring the system and the devices, being able to alter said configuration data. Another objective of the present invention is to allow the incorporation into a security system of 30 heterogeneous products due to their functionality: mobile phones or tablets, etc .; also heterogeneous as to your operating operating system: Android, Blackberry, lOS, Symbian, etc. It is also another of the main objectives of the 5 present invention that said devices are integrated into a security system associated with a mobility situation of the user who uses them, consequently being configured as a personal security advisor or device in travel and travel. These and other objects of the present invention will be more apparent throughout the description that follows. BRIEF EXPLANATION OF THE INVENTION The present invention describes a security system based on smart mobile devices, for example, mobile phone devices, smart phones, tablets, etc. , which have a camera and 20 wireless communication to an extensive network such as the Internet or mobile telephony, in which said devices by means of a downloadable module adopt the functionalities of a terminal with security and surveillance functions. 25 This module incorporates the procedures for converting the camera or cameras of the mobile device into a video surveillance camera, including the ability to operate different security procedures typical of the The present invention, as will be explained in detail below, as well as the possibilities of linking external of said surveillance terminal or terminals, as appropriate, to an extensive network such as the Internet. In one of the possible preferred embodiments of the 5 invention, different mobile phones are located in positions selected by the user, each of them using the system procedures of the invention These procedures included in a module built into these phones, enable cameras 10 of photos of said devices in detecting cameras of movement, allow video recording, 'audio and take snapshots not only on demand, but in response to the motion detection of your area of vision . lS All these now surveillance terminals can link to another terminal that acts as a central and communications center with a security center remote, through secure communication protocols that twenty identify the content of the information and its origin in accordance with the standards of the communication technique and data encryption. The existing procedures in the system activate the 25 communication and remote control of said terminals that can record video, audio and take snapshots photographic, and even emit sound warning signals and / or lighting. Alarms can be linked to the system conventional sound or other media, spotlights, objects 30 mobiles, etc., that are triggered by order of the center of security or automatically when fulfilled certain assumptions valued as intrusion and of security breach. This system also allows the Event recording as a preventive form of security. The versatility of the present invention allows it 5 display its advantages in mobility situations of the user, of the mobile device, so that procedures incorporated in this system they allow this to be a true security advisor travel and travel staff, warning of crossing 10 from a dangerous area, informing how to access help as quickly as possible, alerting upcoming security services, activating alerts from civil protection for local emergency states or national, etc lS In this way all the objects have been obtained pursued by the invention allowing the creation of a security and surveillance system taking advantage of Media and telephone devices twenty mobile, even in disuse, with a very satisfactory in terms of efficiency, in a system adjustable to individual needs, being in set of reduced economic cost. 2S DETAILED EXPLANATION OF THE INVENTION The present invention consists of a system of security based on smart mobile devices, for example mobile phone devices, phones smart, tablets, etc , which have 30 communication to an extensive network such as the Internet or mobile telephony, of different services as per example those of a camera of fo coughs, etc. , in which said Devices are integrated into a centralized Security System. When the present invention refers to devices 5 smart phones are referring to mobile devices, mainly mobile phones, which include access to an extensive network, such as the Internet or a mobile phone network, with different services, such as those of one or several cameras, 10 GPS, etc. This includes tablets with a camera or other similar devices that incorporate communications, a camera and the ability to receive operating instructions through a downloadable program module. 15 In an example of practical implementation, from a mobile phone with a camera, it is downloaded from it, via a web service for downloading applications or from a pe and transferring it to the phone, a module Downloadable incorporating the methods of the system of the present invention. The phone is placed with the camera focused on the surveillance zone, activating said module that through the built-in options establishes the relationship with a data center. 25 safety control and its operating parameters. The aforementioned downloadable module incorporates an API (Application Programming Interface) of security functions with an interface for each 30 host operating system, with a view to facilitating the operation and maintenance of system procedures. Obviously, the methods of system of the invention in a specific program for each telephone platform, but this does not substantially alter the procedure for the purposes of the present invention. 5 The procedures included in the aforementioned module include: -activation of telephone communications to make it accessible and activate or deactivate its functions 10 r emotamente, as well as to receive the information captured by said mobile in its different services: camera, sound, etc. motion detection via detection of a sufficient modification of the pixel map of the image 15 captured by the camera or cameras of the phone procedures for compression of the information to be transmitted and for decompression of the information received, in order to decrease the amplitude of the data band used in the transmission of 20 information; this includes the encryption of said information by means of a secure encryption, in accordance with the technique, which identifies the equipment that emits the information and validates said information, -the authorization of other functionalities or services 25 existing in said telephone or mobile device, such as a flash light, the loudspeakers of the telephone, a GPS, etc., depending on the nature and performance of each device and the safety procedure used. 30 Thus, the user can use old and disused mobile phones, tablets, etc., to Set up a safety net. You can even decide at each moment the number of devices you will use in this task and its location. For example, while sleep you can use your favorite tablet to monitor S an area of your house or garden and the next day disconnect it from the safety net and take it away I get to work. The possibilities offered by the present invention are 10 exceptional, considering the proliferation of mobile and smart devices incorporating a Photo camera exists in many modern homes. In addition to the system of the invention, lS get great control over the parameters and means of security in the hands of the end user, who can choose by different security companies offering a central security service within the parameters of the present invention without that variation of twenty centralized security provider represent the modification of all its equipment and a high investment associated with each change of provider. Moreover, the present invention by modules 2S suitable downloadable allows you to configure different security environments using mobile devices, allowing for example to dispense with the server centralized security and that is the user who exercises this role, for example receiving all the 30 security alerts to a web page, via messaging Instant, such as SMS, or sending data to your phone staff, even with the proper procedures can Access the display and control functions of your devices from your phone security located in your home. 5 All this is possible thanks to the fact that the present invention, in fact, represents an incorporation of flexibility, via downloadable security procedures in program modules with respect to the previous technology where hardware and procedures 10 (software) were strongly related. The solution that the present invention represents is feasible because there is a large number of mobile phones and other smart devices held by the users that can be used to establish a safety net based on them. In addition, the aforementioned devices are programmable and can, via said programs, make their physical functions accessible, such as the camera, or the sound according 20 to the specifications of your operating system. In practice, said operating system of each device (Android, Symbian, Blackberry, ros, Windows, etc.), incorporates the means and / or functions to access the phone's features. A simple solution, although not the only one, is to create an interface between each API of each family of phones with the functionalities or own API that gathers the procedures of the present invention, in this way said own procedures 30 are common to all platforms and only the adaptation or translation to each family of products should be modified. This functional specialization allows Optimally distribute the work between computer and security professionals to configure the system for each case of practical realization. In another of the possible and main cases of practical embodiment of the present invention the system is configured for situations with device displacement. The procedures incorporated in the present invention allow to adapt to this situation and 10 Set up as a personal security advisor. Specifically, as in the previous case of preferred embodiment, the application or module downloaded in the device allows a center of 15 control or security center can access the functions or services of the telephone. In this way different situations can occur when the user enrolled in the system and using the methods of the invention activates different security services. The invention allows security procedures to be deactivated and there is no monitoring of the device states. The invention incorporates an activation process of the emergency and / or alarm procedures by pressing an activation button of said procedures, said "SOS" icon / button arranged on the screen of the device which can advantageously be a touch screen . The invention provides a double check of the activation of the "SOS" button, for example, by requesting a second press on the device. The invention provides for other means of activating emergency procedures other than the use of the SOS button. In this way, the system of the invention 5 contemplates configuration conditions in which the disconnection of the connector cable from the headphones acts as a virtual micro switch. When the headphone cable is disconnected, a countdown preset by the user would be activated and if not deactivated 10 through a secret code, it would send the SOS signal to the server. In another of the procedures provided for by the invention, for example in driving situations, another possible method of activating the emergency situation alarm is a sudden and sudden deceleration of the vehicle, measured by inertia sensors in the device or through GPS geolocation measurements, which would indicate 20 that a traffic accident has been suffered, so that the signals and procedures corresponding to that emergency would be emitted. Different degrees of monitoring of the 25 device with specific services attributed to each of said monitoring levels. For example, GPS tracking and security messages via instant messaging, or otherwise active monitoring, for example when the user 30 activates this state because he feels that he is being followed or that he is in danger or because he is crossing an area especially compromised in terms of security, etc. In general, the present invention incorporates into the module or application that is downloaded to the device and executed therein, a set of steps that 5 include: -the enablement of the services available on said devices: the camera or cameras, the flash, the GPS, microphone and speakers, etc. -the means to enable the camera or cameras 10 of the devices such as surveillance cameras with video motion detection The procedures allow two-way communication between said devices and at least one control center. 15 -said communication may include recorded images of video, photo snapshots, sound, voice and instructions for action on the services available on the device -such compressed and encrypted communication, encrypted 20 with seal of origin and content according to known technique an operating procedure that relates the geollocation of the device to a security database of geographic locations, determining 25 closest locations of service centers related to an emergency according to each type of emergency said location of the device collated with a hierarchy of geolocated security levels located 30 in said Security Database, depending on the type of emergency and depending on the season, day of the week and time of day the assessment of the emergency by said control center and its typing action instructions on the services of said device in response to the situation of S previously determined emergency. The system of the invention establishes a network of local security linking different units of said mobile devices, each configured of 10 according to claim 1 by means of said module or application, where each element of said identification is identified security network with a registration ID, and operating the control center with each of said dispositives . fifteen At least one of said control centers may be a remote center linked via the Internet or another network extensive, such as mobile telephony (GSM, 3G, 4G, etc.). twenty In response to an emergency situation said center Control orders video recording, socket photographs, send acoustic messages and / or activate others security elements existing in said local network of security, such as alarms, lights, etc. 25 When an emergency situation occurs, both in the first case of local fixed security network, as in the case of a user moving with a device mobile security, a set of 30 procedures Application No. P20 1 400046 F.Ercctiva 01/20/2014F.OEPM 01/20/2014 lS 5 an operating procedure that relates the geolocation of the device to a security database of geographic locations, determining the closest locations of the service centers related to an emergency according to each type of emergency 10 -the assessment of the location area of the device according to its danger according to said Safety Database and the type of emergency the control center assessment of the emergency and its typificationbypartfromsaying fifteen operating instructions on said device in response to an emergency determined previously.the theservices situationof of 20 25 Once the emergency type or alarm has been established by said control center, a list of actions that are preconfigured in a Security Database that relates the type of emergencies, geographical situations and actions to be carried out are executed. These actions include communication with the user and the transmission of instructions on their screen related to the emergency produced. Since hepointfromviewfromthereplytoasituation 30 emergency or security, the potential that the present invention allows to use and existing in the enablement of the device are enormous smart mobile. From calling the user to accurately calibrate the emergency situation, give recommendations and / or offer an action to follow, etc. 5 Voice messages and device flash light activations, audible alarms, etc., can be used according to the services available on each device. The invention also provides for activation and 10 operation of other devices linked to the local security network and accessible via WIFI or other communication protocol and an interface gateway to it. This allows, for example, the activation and deactivation of a conventional alarm or any 15 another electronically controlled device, such as house lights controlled via a home automation interface, TV or the movement of a radio controlled object. The actions included in the present invention provide for the possibility of simulation of the device malfunction, so that even if it seems inoperative it continues to offer data on its location, even transmission of images and sound. This, no doubt, can 25 offer numerous advantages for the follow-up of, for example, an emergency associated with a crime, where it can facilitate the detention of criminals. Another of the procedures included in the system of The present invention is to use the recording media of the cameras as video prevention, so that if the user needs to register images in a manner Instant and preventive on a fact that could be eventual and counterproductive, a sequence of recording of images would be initiated that would be automatically uploaded to the server, if later use were necessary. In fact, the invention contemplates different levels of administration or central supervision service. According to this conception the invention allows an intermediate category of administration centers or of 10 administrators, located between the individual device or the local security network and the centralized control and security center. This links a user or a group of users to a category of "super administrator" in front of other users, by 15 example to configure and establish a geographical area or distance in reference to other users, which allows that in the event that other users move away from that area or group, or exceed that distance, the system will send a warning to said super administrator, 20 warning that a member has separated from the group and if he is in an area with a certain level of risk. Finally, the Security Database to n tes 25 mentioned, contains security geolocation data linking geographic locations, streets, city addresses, etc. , with a pre-established security hierarchy that discriminates locations based on their danger, 30 consideringblissdangertooinfunctionfromthe station of year,dayfromtheweekYfromthehourof theday . The BasefromDatafromsecuritystorefromshape geolocatable, for example in KML or similar data, said security assessments. In this way, when a device enters, via its 5 communication possibilities, its geographical location in the system, sending it to the centralized control center, is automatically checked against its security hierarchy, activating the corresponding safety functions associated with said danger. 10 This is of paramount importance to execute the safety recommendation function or actions to be taken in the event of a danger forecast. This way of having structured security information allows 15 an immediate and automatic response of the system, which alleviates possible transmission delays between the units involved, and provides information and actions to be carried out in real time. 20 A case of practical realization of this function would be represented by a user who visits a city that does not know, said city included in the Database of the present invention and mapped in the security hierarchy of the present system. When the user by The prevention function activates the security tracking function of the present invention, for example, is informed at the time of the potential security risk situation that it is experiencing according to the place where it is located, it can even receive a message in the form of 30 recommended route and the routes to avoid. This planning feature could not be offered in real time without Access to information in the Database of characteristic safety of the present invention. Naturally, many other functions of S security that general online benefit from the Security Database with geolocated data from the present invention, which take advantage of the speed of obtaining geolocated information characteristic of The present invention. 10 The system of the invention, therefore, is susceptible to adopt different realization cases and attend to very different security demands, practically through the incorporation of common procedures, via a lS downloadable application and optionally, in modules accessory procedures incorporate performance additional specific to particular situations concrete. twenty The system is therefore very versatile and efficient, with costs very reduced application, while offering innovative security features that do not currently exist or can only be implemented with expensive equipment and services dedicated to the 25 security . It is understood that they fall within the invention those alterations of finish and form that Do not alter the essence of it. 30
权利要求:
Claims (6) [1] 1.-SECURITY AND SURVEILLANCE SYSTEM BASED ON INTELLIGENT MOBILE DEVICES of the type of 5 devices capable of communicating to an extensive network, such as the Internet or telephony, which have the capacity to load and execute an operating procedure in the form of a module or application downloadable and that has services such as, for example, a camera 10 of photos and GPS, being of the type of devices such as for example smartphones, tablets and GPS, CHARACTERIZED because said module or application comprises -the enablement of the services available in said 15 devices: for example, camera or cameras, flash, GPS, microphone and speakers, the procedures that allow establishing bi-directional communication between said devices and at least with a control center, 20-an operating procedure that locates the location of the device in a Geographic Security Database; If you have a geographic security database that includes an assessment of 25 danger for each geographical position and type of emergency, according to a pre-established orderly hierarchy, depending on the season of the year, day of the week and the time of day. 30 2. - SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to the N "F.Efccti application, 'to F.OEPM 11/12/2014 12/12/2014 5 claim 1, CHARACTERIZED in that said Security Database has action instructions on the services of said device in response to the emergency situation, determining the actions of said control center. 10 3. SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to claims 1 and 2, CHARACTERIZED because the means are available to enable the camera or cameras of said devices as surveillance cameras with video motion detection. 15 20 4. DEVICE SYSTEM SECURITY AND SURVEILLANCE BASED ON MOBILE previous, INTELLIGENT, CHARACTERIZED according to why said communication between said mobile devices and said control center includes recorded video images, photographic snapshots, sound, voice and action instructions on the services available on the device. 2S 5. S I STEMA DEVICES vindication of SAFETY AND SURVEILLANCE communication based on previous MOBILE, INTELLIGENT, CHARACTERI ZED according to why the said is compressed and encrypted, being coded with seal of origin and contained according to the known technique. 30 6. SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to the preceding claims, CHARACTERIZED because establishes a local security network linking different units of said mobile devices, each configured according to claim 1 by means of said module or application, where 5 identifies each element of said safety net witha registration ID and operating at leastwith a control center. 7, - SECURITY AND SURVEILLANCE SYSTEM BASED ON 10 SMART MOBILE DEVICES, according to theprevious claim, CHARACTERIZED because whenminus one of these control centers is a centerRemote linked via Internet. 15 8, - SECURITY AND SURVEILLANCE SYSTEM BASED ON SMART MOBILE DEVICES, according to any one of the preceding claims, CHARACTERIZED because it contemplates different levels of administration or central supervision service, so that it can 20 linking a user or a group of users to a category of "super administrator" in front of other users, for example to configure and establish a geographical area or distance in reference to other users, creating for example a security alert 25 when other users move away from that area or exceed that distance. 9, - SECURITY METHOD AND SURVEILLANCE BASED ON SMART MOV ILES DEVICES, according to the system of Any one of claims 1 to 8, CHARACTERIZED because it includes an alarm and / or emergency activation procedure. 10-SECURITY AND SURVEILLANCE METOOO BASED ON SMART MOBILE DEVICES, according to the previous claim, CHARACTERIZED because said 5 Activation of the alarm and emergency procedures occurs by pressing an "SOS" button / icon on the screen of one of these devices, such as on a touch screen. 10 11. SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to claim 9, CHARACTERIZED because said activation of the alarm and emergency procedures require a double verification control requesting a second 15 press on the device. [12 ] 12. - SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said activation of the alarm and emergency procedures is produced by disconnecting the connector cable of the headphones that acts as a virtual micro switch, so that when the headphone cable is disconnected, a countdown is activated, preset by the 25 user, which if not deactivated by a secret code would send the SOS signal to said control center. [13] 13.-SECURITY AND SURVEILLANCE METHOD BASED ON 30 SMART MOBILE DEVICES, according to claim 9, CHARACTERIZED because said activation of the alarm and emergency procedures occurs, N "application F. Effective F.OEPM 11/12/2014 12111/2014 24 in situations of driving a vehicle, by capturing a sudden and sudden decrease in speed, obtained from said device, in which case the signals and procedures are emitted 5 corresponding to a traffic accident emergency. [14 ] 14. -THE SECURITY METHOD AND VIGILANC I BASED ON SMART MOBILE DEVICES, according to any one 10 of claims 9 to 13, CHARACTERIZED in that said Security Database relates type of emergencies, geographical situations and pre-configured actions to be performed. 15 15.-SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said actions include communication with the user and the transmission of instructions on their related screen 20 with the emergency produced. [16 ] 16. -THE SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOVI LES DEVICES, according to the previous claim, CHARACTERIZED because said 25 actions include, for example, voice messages, device flash light activations and audible alarms, according to the services available on each device. 30 17. - SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said Actions include non-operating device simulation procedures and / or shutdown, so that even if it seems inoperative it still offers data on its location, including transmission of images and sound. 5 18.-SECURITY AND SURVEILLANCE METHOD BASED ON SMART MOBILE DEVICES, according to the preceding claim, CHARACTERIZED because said actions include using the recording means of 10 cameras as video prevention, so that a recording sequence of images that are automatically uploaded to the server is started. [19 ] 19. -SECURITY AND SURVEILLANCE METHOD BASED ON 15 INTELLIGENT MOBILE DEVICES, according to claim 9, CHARACTERIZED in response to an emergency situation said control center orders the recording of video, taking pictures, sends acoustic messages and / or activates other elements of 20 security existing in said local security network, such as alarms, lights, etc.
类似技术:
公开号 | 公开日 | 专利标题 ES2543620A1|2015-08-20|Security and surveillance system based on smart mobile devices | ES2665957T3|2018-04-30|Apparatus and method to initiate and share information about incidents in a communication system US9405360B2|2016-08-02|IP camera smart controller KR101610026B1|2016-04-07|The hybrid security streetlamp system CA2829329A1|2011-09-29|System and apparatus for locating and surveillance of persons and/or surroundings US20130329047A1|2013-12-12|Escort security surveillance system JP2007072622A|2007-03-22|Notification device of crime prevention state, notification method of crime prevention state, offering device of crime prevention state, and computer program for making computer perform notification method of crime prevention state KR101562870B1|2015-10-29| The Argos tower and Argos system offering a cctv monitor for anti-crime and anti-disaster with wi-fi direct service KR101654181B1|2016-09-22|A security closed circuit television emergency call bell system using smart phone apps and smart tags KR101137451B1|2012-04-20|Intelligent Image Tracking Method CA3031791A1|2018-02-01|Security monitoring system and methods KR101617342B1|2016-05-02|Application for caring children and method for operating the same ES2728511T3|2019-10-25|System and method to control security systems KR101995028B1|2019-10-01|user safety map providing method for personal safety KR101493399B1|2015-02-16|Near Offender Alarm System and Control Method of the Server in it KR20110035420A|2011-04-06|Methods of notifying danger using sensor KR101855847B1|2018-05-10|System for disaster information delivery KR101398839B1|2014-05-27|Method for taking a picture of a subject using a smart phone gps connected to a network cctv KR101401299B1|2014-05-30|Method for taking a picture of a subject using a smart phone gps connected to network cctvs KR20160010633A|2016-01-27|Invader Monitoring and Alarm System using Thermal Image Fusion Camera KR101508934B1|2015-04-08|Electronic anklet approach alarm system KR20160017861A|2016-02-17|System and method for providing safety keeper service EP3440647B1|2019-08-14|Method for the remote monitoring of persons through smart mobile terminals and web services WO2014198970A1|2014-12-18|Theft detection and alarm apparatus coordinated with other similar devices US20170347025A1|2017-11-30|User-wearable type photographing device
同族专利:
公开号 | 公开日 US20160343238A1|2016-11-24| US10062267B2|2018-08-28| ES2543620B1|2016-05-31| WO2015107239A1|2015-07-23| EP3098794A1|2016-11-30| EP3098794A4|2016-12-21|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US7221928B2|2003-10-01|2007-05-22|Laird Mark D|Mobile emergency notification system| US8624727B2|2008-01-28|2014-01-07|Saigh And Son, Llc|Personal safety mobile notification system| US8559914B2|2008-01-16|2013-10-15|M. Kelly Jones|Interactive personal surveillance and security system| US8467768B2|2009-02-17|2013-06-18|Lookout, Inc.|System and method for remotely securing or recovering a mobile device| US8676151B2|2010-10-19|2014-03-18|Guardity Technologies, Inc.|Detecting a transport emergency event and directly enabling emergency services| US8538374B1|2011-12-07|2013-09-17|Barry E. Haimo|Emergency communications mobile application| EP2613575A1|2012-01-09|2013-07-10|SJB Computer Consultants Ltd.|A method of operating a mobile communication device| WO2013173079A1|2012-05-16|2013-11-21|Innovate, Inc.|Ecg-enabled personal emergency response systems|US10192413B1|2015-10-26|2019-01-29|Innotech Security, Inc.|Theft deterrent surveillance system| US20180182214A1|2016-12-22|2018-06-28|Mivalife Mobile Technology, Inc.|Mobile Device Security System| CN106791168A|2017-01-13|2017-05-31|北京奇虎科技有限公司|Information of mobile terminal guard method, device and mobile terminal| CN107564252A|2017-08-16|2018-01-09|武汉协鑫新能源电力设计有限公司|A kind of intelligent alarm and rescue system and method| ES1231283Y|2019-02-20|2019-09-09|Albert Manuel Huesca|Personal security system consisting of two groups of devices and receivers of information and alarms| CN111489518B|2019-12-28|2021-11-23|上海申朴网络科技有限公司|Instant alarm system based on state detection| US20210204094A1|2019-12-31|2021-07-01|Micron Technology, Inc.|Tracking wireless peripheral devices|
法律状态:
2016-02-04| PC2A| Transfer of patent|Owner name: DR.SECURITY S.L. Effective date: 20160129 | 2016-05-31| FG2A| Definitive protection|Ref document number: 2543620 Country of ref document: ES Kind code of ref document: B1 Effective date: 20160531 | 2020-09-22| FD2A| Announcement of lapse in spain|Effective date: 20200922 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 ES201400046A|ES2543620B1|2014-01-20|2014-01-20|Security and surveillance system based on smart mobile devices|ES201400046A| ES2543620B1|2014-01-20|2014-01-20|Security and surveillance system based on smart mobile devices| US15/112,601| US10062267B2|2014-01-20|2015-01-20|Security and surveillance system based on smart phone devices| EP15737618.7A| EP3098794A4|2014-01-20|2015-01-20|Security and surveillance system based on intelligent mobile devices| PCT/ES2015/000007| WO2015107239A1|2014-01-20|2015-01-20|Security and surveillance system based on intelligent mobile devices| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|