The present disclosure relates to an antitheft apparatus, an antitheft method, and a program.
A user using a spot in a space used by the general public (public space), such as a restaurant, a library, or a co-working space, may temporarily leave the used spot (e.g., a seat) to make a phone call, go to the toilet, or the like. In this case, the user commonly carries his or her belongings such as valuables in order to prevent the belongings from being stolen. For example, a user who has been working on a laptop would close the laptop in the middle of a task, and carry it with him or her, and then open it again after returning to his or her seat to start working.
Jpn. Pat. Appln. KOKAI Publication No. 2020-091829 describes a technique intended for detection of a suspicious object appearing in time-series images.
The technique of Jpn. Pat. Appln. KOKAI Publication No. 2020-091829 may allow detection of an action that is different from normal. However, for example, a third party taking away a user's belongings is very likely to constitute an act of theft, whereas a user taking away his or her own belongings is a legitimate act. Therefore, when the action of taking away an article is defined as a normal action, a third party taking away an article of the user will be ignored as a normal action. On the other hand, when the action of taking away an article is defined as an action that is different from normal, even the user taking away his/her own article will be detected as an action that is different from normal.
In the technique of Jpn. Pat. Appln. KOKAI Publication No. 2020-091829, individual identification information is created and transmitted when a suspicious object is detected; however, such handling is not expected to be effective in inhibiting the suspicious object from taking an action that is different from normal.
Hereinafter, an embodiment of the present disclosure will be described in detail based on drawings. Note that in the drawings for explaining the embodiment, the same components are generally denoted by the same reference sign, and redundant descriptions thereof will be omitted.
According to an aspect of the present disclosure, an antitheft apparatus includes: means for acquiring first event information related to an alert mode; means for controlling the alert mode in accordance with the first event information; means for monitoring movement of an object when the alert mode is enabled; and means for outputting an alarm when the alert mode is enabled and movement of the object is detected.
A configuration of an antitheft system will be described.
As shown in
The antitheft apparatus 10 and the protection object may be configured to be capable of wirelessly communicating with each other. The wireless communication takes any scheme such as Bluetooth (registered trademark), ZigBee (registered trademark), specific low-power wireless communication, or wireless Local Area Network (LAN).
The antitheft apparatus 10 provides an antitheft service for the protection object 30 in response to an instruction from a user of the protection object 30 (owner of the protection object 30). As an example, the antitheft apparatus 10 is installed in a public space. The public space is, for example, a space in which a person other than the user of the protection object 30 may stay (i.e., where theft damage may occur), such as an eating and drinking establishment (e.g., a café or a restaurant) or a co-working space.
Further, the antitheft apparatus 10 performs wireless power supply to the protection object 30 in response to an instruction from a user of the protection object 30 or in response to a power supply request from the protection object 30 or another communication apparatus operated by the user.
The protection object 30 includes a battery (not shown). The protection object 30 charges the battery using the energy of a power transmission beam emitted from the antitheft apparatus 10.
The protection object 30 is any electronic equipment that can be driven by a battery. As an example, the protection object 30 is a mobile computer (e.g., a smartphone, a tablet terminal, a laptop computer, or a wearable device) or another electronic equipment, or a mobile battery.
While one antitheft apparatus 10 and one power protection object 30 are shown in
When there are a plurality of protection objects 30, information for identifying the protection object 30 or information for identifying the user of the protection object 30 may be included in the instruction from the user or the power supply request. This allows the antitheft apparatus 10 to identify the protection object 30 (a target power reception apparatus) targeted for the wireless power supply.
When there are a plurality of antitheft apparatuses some of these apparatuses may cooperate to perform the wireless power supply, or one of them may perform the wireless power supply. The antitheft apparatus 10 that performs the wireless power supply may be designated by the target power reception apparatus or may be determined by one or more antitheft apparatuses 10 that have received an instruction from the user or a power supply request.
A configuration of the antitheft apparatus according to the present embodiment will be described.
As shown in
The storage device 11 is configured to store a program and data. The storage device 11 is, for example, a combination of read-only memory (ROM), random-access memory (RAM), and a storage (e.g., a flash memory or a hard disk).
The program includes, for example, the following program:
The data includes, for example, the following data:
The processor 12 is configured to realize functions of the antitheft apparatus 10 (in particular, a function of preventing the protection object 30 to be stolen and a function of controlling the power transmitting unit 15) by activating the program stored in the storage device 11. The processor 12 is an example of a computer or a controller.
The input/output interface 13 is configured to acquire a signal (e.g., an instruction from a user, sensing data, or a combination thereof) from the input device 16 to be connected to the antitheft apparatus 10, and to output a signal (e.g., a control signal, an image signal, or a combination thereof) to the output device 17 to be connected to the antitheft apparatus 10.
The input device 16 is, for example, a keyboard, a pointing device, a touch screen, a sensor (e.g., an optical sensor), or a combination thereof.
The optical sensor may include, for example, at least one of the following:
The optical sensor (e.g., a camera) photographs a periphery of the protection object 30 in accordance with, for example, a control signal from the processor 12. The camera may be configured so that at least one of a position or a posture of the camera can be controlled in accordance with a position of the protection object 30. However, the position and the posture of the camera are preferably controlled so that the faces of the user of the protection object 30 and other person are not included in the shooting range. This allows acquisition of an image necessary to provide at least one of an antitheft service and a wireless power supply service without causing discomfort or suspicion to persons in the space where the antitheft apparatus 10 is installed.
The output device 17 is, for example, a display, a speaker, a light source, an alarm device, an indicator, or a combination thereof.
As shown in
The light source 171 illuminates the periphery of the protection object 30 in accordance with, for example, the control from the processor 12. Accordingly, an edge (to be described later) can be more accurately identified from image data captured by the camera. For example, the light source 171 emits light along a photographing direction of the camera. When a monitoring object (e.g., a hand of a person) is present within an emission range of the light, since a part of emitted light is reflected by the monitoring object, a part of the emitted light does not reach an area that is blocked by the monitoring object. In other words, a difference in an amount of reached light is created between the monitoring object and the area blocked by the monitoring object. Therefore, in the image captured by the camera, brightness of the monitoring object increases while brightness of a periphery of the monitoring object relatively decreases (a shadow is created). Therefore, according to the light source 171, a difference in brightness between the monitoring object and a periphery thereof can be increased and an edge of the monitoring object can be more accurately identified.
The light source 171 may be configured so that at least one of a position or a posture of the light source 171 can be controlled in accordance with a position of the protection object 30. The light source 171 may be continuously turned on or may be intermittently turned on according to the photographing by the camera.
The alarm device 172 outputs an alarm in response to control from the antitheft apparatus 10.
As an example, the alarm device 172 is installed in the periphery of the protection object 30 so that a person in the periphery of the protection object 30 (a person who has taken away the protection object 30 or a guest or manager of the public space) will be more likely to perceive the alarm. The alarm stimulates human sense of touch, smell, or taste, not limited to human vision or hearing, thereby causing surrounding people to perceive at least one of the presence of the alarm itself and the contents of the alarm. The alarm device 172 includes, for example, a light source, a lamp, a display, a projector, a smoke generator, a speaker, a vibrator, a mist generator, an odor generator, a taste stimulator (e.g., a mouthpiece-type device capable of supplying a taste stimulant to the tongue of a wearer), or a combination thereof.
Alternatively, the alarm device 172 may be a communication apparatus carried by the user of the protection object 30. The communication apparatus carried by the user of the protection object 30 may be registered in advance in association with the user or the protection object 30 or may be detected based on the position information for the communication apparatus. By causing such a communication apparatus to output an alarm, the antitheft apparatus 10 can notify the user of the protection object 30 of the taking of the protection object at an early stage.
The indicator 173 outputs visual information in response to control from the antitheft apparatus 10. The antitheft apparatus 10 generates an instruction to output visual information in accordance with its own operation mode (e.g., enabling/disabling of an alert mode (to be described later), enabling/disabling of a power supply mode, or a combination thereof), and transmits the instruction to the indicator 173. Accordingly, the user of the protection object 30 can be enabled to intuitively recognize a start and an end of the provision of the antitheft service or the wireless power supply service. As an example, the indicator 173 emits light in a first color when the alert mode of the antitheft apparatus 10 is enabled, and emits light in a second color different from the first color when the alert mode of the antitheft apparatus 10 is disabled. The indicator 173 may be an apparatus independent of the light source 171 or the alarm device 172, or at least one of the light source 171 or the alarm device 172 may also serve as the indicator 173.
The communication interface 14 is configured to control communication between the antitheft apparatus 10 and an external apparatus (e.g., the protection object 30 or another communication apparatus operated by a user).
As an example, the communication interface 14 is a wireless communication module supporting at least one system of Bluetooth, ZigBee, specified low-power radio communication, and a wireless LAN.
The power transmitting unit 15 is configured to emit a power-supplying electromagnetic wave as a power transmission beam (i.e., perform wireless power supply) in response to a control signal from the processor 12. The power-supplying electromagnetic wave is, for example, a microwave, a millimeter wave, or a light wave (laser light or LED light). In the following description, the power-supplying electromagnetic wave is assumed to be a microwave.
More specifically, the power transmitting unit 15 includes a signal source, a signal processing circuit, and a plurality of antennas (an example of a “beam-emitting element”).
The signal source is, for example, an oscillator that generates the power-supplying electromagnetic wave.
The signal processing circuit performs, for example, signal processing including at least one of phase adjustment, amplitude adjustment, and filtering on the power-supplying electromagnetic wave generated by the signal source. The signal processing circuit may include an amplifier for the amplitude adjustment (power amplification).
The antenna emits the power-supplying electromagnetic wave output from the signal processing circuit into space as a power transmission beam. A lamp serving as the alarm device 172 or the indicator 173 may be attached around the antenna. As an example, by turning on the lamp, surrounding people can perceive that the wireless power supply is being carried out.
The power transmitting unit 15 may include a planar antenna or a linear antenna. The plurality of antennas may be arranged in an array, in a matrix, or in different manners.
The plurality of antennas form a power transmission surface. The power transmission surface corresponds to a portion of the power transmitting unit 15 that takes charge of emitting the power transmission beam. The power transmission surface depends on the configuration of the power transmitting unit 15 (e.g., the size, shape, arrangement, and number of the antenna). As an example, a rectangular power transmission surface including all the antennas provided for the power transmitting unit 15 may be defined.
A configuration of the protection object according to the present embodiment will be described.
As shown in
The storage device 31 is configured to store a program and data. The storage device 31 is, for example, a combination of ROM, RAM, and a storage (e.g., a flash memory or a hard disk).
The program includes, for example, the following program:
The data includes, for example, the following data:
The processor 32 is configured to realize functions of the protection object 30 by activating a program stored in the storage device 31. The processor 32 is an example of the computer.
The input/output interface 33 is configured to acquire a signal (for example, an instruction from a user, sensing data, or a combination thereof) from the input device 36 to be connected to the protection object 30. In addition, the input/output interface 33 is configured to output a signal (e.g., a control signal, an image signal, or a combination thereof) to the output device 37 to be connected to the protection object 30.
The input device 36 may be, for example, a keyboard, a pointing device, a touch screen, a sensor (e.g., a posture sensor), or a combination thereof.
The posture sensor may include, for example, at least one of the following:
The output device 37 is, for example, a display.
The communication interface 34 is configured to control communication between the protection object 30 and an external apparatus (e.g., the antitheft apparatus 10). As an example, the communication interface 34 transmits sensing data to the external apparatus.
For example, the communication interface 34 is a wireless communication module supporting at least one system of Bluetooth, ZigBee, specified low-power radio communication, and a wireless LAN.
The power receiving unit 35 is configured to receive the power transmission beam emitted into space by the power transmitting unit 15 to obtain power.
More specifically, the power receiving unit 35 includes an antenna and a power converter.
The antenna receives a power-supplying electromagnetic wave (a power transmission beam) that propagates through the space.
The power converter converts the power-supplying electromagnetic wave received by the antenna into (direct current) power.
When the power-supplying electromagnetic wave is a microwave, the antenna and the power converter may be a rectenna. When the power-supplying electromagnetic wave is a light wave, the antenna and the power converter may be a photoelectric converter.
The power receiving unit 35 may include a planar antenna or a linear antenna. The plurality of antennas may be arranged in an array, in a matrix, or in different manners.
The plurality of antennas form a power reception surface (which may also be referred to as an aperture surface). The power reception surface corresponds to a portion of the power receiving unit 35 that takes charge of receiving the power transmission beam. The power reception surface depends on the configuration of the power receiving unit 35 (e.g., the size, shape, arrangement, and number of the antenna). As an example, a rectangular power reception surface including all the antennas provided for the power receiving unit 35 may be defined. The power reception surface may be an effective aperture surface based on radio wave characteristics of the power receiving unit 35.
Further, the protection object 30 includes a battery (not shown). The battery supplies power to each unit of the protection object 30. The battery can be charged with the power that is obtained by the power receiving unit 35.
An overview of the present embodiment will be described.
As shown in
Although the antitheft apparatus 10 is supported by an arm in the example of
The antitheft apparatus 10 operates in accordance with a combination of enabling/disabling of the alert mode and enabling/disabling of the power supply mode. In the example of
The user of the protection object 30 can instruct the enabling/disabling of the alert mode of the antitheft apparatus 10. As an example, the user instructs enabling/disabling of the alert mode of the antitheft apparatus 10 by using a gesture set including one or more specific gestures. As shown in
The user of the protection object 30, when temporarily leaving the table TBL, can instruct the antitheft apparatus to enable the alert mode of the antitheft apparatus 10. When the alert mode is enabled, the antitheft apparatus 10 causes the indicator 173 to emit light, for example, as shown in
The antitheft apparatus 10 monitors the taking of the protection object 30 while the user is absent. As shown in
When the user of the protection object 30 returns to the table TBL, the user instructs the antitheft apparatus to disable the alert mode of the antitheft apparatus 10. When the alert mode is enabled, the antitheft apparatus 10 causes the indicator 173 to turn off, for example, as shown in
A database according to the present embodiment will be described. The following databases are stored in the storage device 11.
A user database according to the present embodiment will be described.
The user database stores user information. The user information is information related to the user of the protection object 30.
As shown in
The “ID” field stores user ID information. The user ID information is information for identifying the user of the protection object 30.
The “Name” field stores user name information. The user name information is information related to a user name of the protection object 30. The user name may be a nickname of the user or a real name of the user.
The “Hand information” field stores hand information of the user of the protection object 30. The hand information is information related to a hand of a person (user). The hand information may include, for example, at least one of the following:
The hand information of the user of the protection object 30 may be registered, for example, upon the first use of a wireless power supply service or an antitheft service. When the hand information includes information related to a gesture, the gesture may be designated by the user or may be determined by the antitheft apparatus 10 or a host system thereof. When at least a part of one or more gestures designated by the user corresponds to a gesture that is easily guessed by a third party or a gesture that is unconsciously used by the user, the antitheft apparatus may provide the user with notification about the gesture. This can encourage the user to change the registered gesture to prevent a third party from disabling the alert mode or the user from inadvertently enabling/disabling the alert mode. Alternatively, the antitheft apparatus 10 may reject the registration of such a gesture.
Two or more of the hand information that is a trigger for disabling the alert mode, the hand information that is a trigger for enabling the alert mode, and the hand information that is a trigger for enabling the power supply mode may be the same. This can reduce the number of pieces of hand information that the user of the protection object needs to memorize.
In particular, the hand information that is a trigger for enabling the power supply mode may be reused as the hand information that is a trigger for disabling the alert mode or the hand information that is a trigger for enabling the alert mode. This allows the user of the protection object 30 to register the hand information for controlling the alert mode of the antitheft apparatus 10 without additional work, simply by registering the hand information for enabling the power supply mode at the start of using the wireless power supply service.
However, any authentication information may be used instead of the hand information. For example, the authentication information may include at least one of the following:
The “Contact” field stores contact information. The contact information is information related to a user contact for the protection object 30. The contact information includes, for example, at least one of the following:
The “Power supply amount within period” field stores information on a power supply amount within a period. The power supply amount within period information is information related to the amount of power supplied by the user of the protection object 30 through the use of the wireless power supply service within a predetermined compilation period (e.g., one month). The power supply amount within period information can be used to calculate the amount of money that the provider of the wireless power supply service will charge the user.
A protection object database according to the present embodiment will be described.
The protection object database stores protection object information. The protection object information is information related to the protection object 30.
As shown in
The “ID” field stores a protection object ID. The protection object ID is information for identifying the protection object 30.
The “User ID” field stores a user ID. The user ID is a foreign key that uniquely identifies a related record in the user database (
The “Static information” field stores static information of the protection object 30. The static information for the protection object 30 is information on the attribute or state of the protection object 30 that is not expected to change from the start to the end of the provision of the wireless power supply service. As an example, the static information is a size of the power reception surface, a shape of the power reception surface, a power receiving capability of the power receiving unit 35, and a maximum capacity of the battery.
The size of the power reception surface represents an actual size of the power reception surface. For example, the size of the power reception surface may include at least one of the following:
The power receiving capability of the power receiving unit 35 includes, for example, at least one of the following:
The power receiving capability of the power receiving unit 35 may be categorized as a power receiving class.
The shape of the power reception surface indicates a geometric shape of the power reception surface. The shape of the power reception surface is, for example, a combination of any curves (e.g., a circle or an ellipse), a combination of any straight lines (e.g., a polygon), or a combination of any curve and straight line (e.g., a sector).
The “Dynamic information” field stores dynamic information for the protection object 30. The dynamic information for the protection object 30 is information on the attribute or state of the protection object 30 that is expected to change from the start to the end of the provision of the wireless power supply. As an example, the dynamic information is a position of the power reception surface, a posture of the power reception surface, and a remaining battery capacity. When the protection object 30 moves or rotates during the period from the start to the end of the wireless power supply, at least one of the position of the power reception surface and the posture of the power reception surface changes. The remaining battery capacity of the protection object 30 continues to increase from the start to the end of the wireless power supply.
The position of the power reception surface indicates a relative position of the power reception surface with respect to the power transmission surface. For example, the position of the power reception surface may include at least one of the following:
The posture of the power reception surface indicates a relative direction of the power reception surface with respect to a reference surface (e.g., a horizontal surface or the power transmission surface). As an example, the posture of the power reception surface is an inclination (e.g., at least one of a roll angle, a pitch angle, and a yaw angle of the power reception surface) of the power reception surface with respect to the reference surface.
Processing according to the present embodiment will be described.
Power supply start processing according to the present embodiment will be described.
The power supply start processing of
The antitheft apparatus 10 has received a power supply request from the protection object 30;
As shown in
More specifically, the processor 12 identifies the user of the protection object 30 (that is, the target power reception apparatus) which is targeted for the wireless power supply.
In a first example, the processor 12 refers to the user ID included in the power supply request received from the protection object 30 or another communication apparatus, and identifies the user identified by the user ID.
In a second example, the processor 12 refers to the protection object ID included in the power supply request received from the protection object 30 or another communication apparatus, and identifies the user identified by the user ID associated with the protection object ID in the protection object database (
In a third example, the processor 12 identifies the user associated with the start date and time of the power supply start processing of
After step S101, the antitheft apparatus 10 executes acquisition of the hand information (S102).
More specifically, the processor 12 acquires hand information (an example of “second event information related to a power supply mode”) used for user authentication for starting wireless power supply to the protection object 30.
In a first example, the processor 12 acquires an image of the user from a camera via the input/output interface 13. Here, the processor 12 may control at least one of the position or the posture of the camera as needed. When the hand information is a gesture set consisting of hand gestures, the processor 12 acquires an image of the user's hand. The processor 12 analyzes the image, thereby extracting the hand information.
In a second example, the processor 12 acquires an image of the user from the protection object 30 or another communication apparatus via the communication interface 14. The processor 12 analyzes the image, thereby extracting the hand information.
In a third example, the processor 12 acquires the hand information transmitted from the protection object 30 or another communication apparatus via the communication interface 14.
After step S102, the antitheft apparatus 10 executes user authentication (S103).
More specifically, the processor 12 determines whether the hand information acquired in step S102 matches the hand information of the user identified in step S101 (hereinafter, referred to as “correct hand information”). As an example, the processor 12 refers to the user database (
If the user authentication in step S103 is successful, the antitheft apparatus 10 executes starting of power supply (S104).
More specifically, the processor 12 enables the power supply mode of the antitheft apparatus 10. As an example, the processor 12 can perform at least one of the following:
The control parameter determines an emission direction and a beam shape of the power transmission beam.
The control parameter may be generated to be dependent on at least one of the static information or the dynamic information related to the power reception surface. In this case, the processor 12 generates the control parameter such that the power transmission beam emitted from the power transmitting unit 15 is focused on a spot suitable for the size of the power reception surface, the shape of the power reception surface, and the posture of the power receiving surface at the position of the power receiving surface. In a first example, the processor 12 generates the control parameter such that the intensity of the power transmission beam will be half (i.e., a half-value) of the maximum value at at least part of the edge (i.e., side or vertex) of the power reception surface. In a second example, the processor 12 generates the control parameter such that the intensity of the power transmission beam will be null (i.e., zero value) at at least a portion of the edge of the power reception surface.
With the end of step S104, the antitheft apparatus 10 ends the power supply start processing of
If the user authentication in step S103 fails, the antitheft apparatus 10 ends the power supply start processing of
Standby processing according to the present embodiment will be described.
The standby processing of
As shown in
More specifically, the processor 12 acquires an image showing a state of the hand detection area (an example of a “predetermined area”) (i.e., an image captured so as to include the hand detection area) from the camera via the input/output interface 13. Here, the processor 12 may control at least one of the position or the posture of the camera as needed to capture the hand detection area. The processor 12 performs an edge analysis on the acquired image data, thereby obtaining edge information. The processor 12 refers to the edge information and monitors an edge of a moving object (a biological body (in particular, a hand of a person) or an object).
The hand detection area is an area for the antitheft apparatus 10 to detect the user's hand. The hand detection area is defined in the periphery of the protection object For example, the antitheft apparatus 10 may turn on the light source 171 to allow the user to recognize a range illuminated by the light source 171 as the hand detection area.
As an example, as shown in
However, even if the antitheft apparatus 10 finds an edge of a stationary object in the hand detection area HA, the antitheft apparatus 10 can ignore the edge. By registering position information of an edge of the stationary object existing in the hand detection area HA as a whitelist before start of wireless power supply, the antitheft apparatus 10 can determine whether an edge found inside the hand detection area HA during the wireless power supply can be ignored. Alternatively, the antitheft apparatus 10 may recognize a moving object or a stationary object from an image through image recognition processing. This makes it possible to determine whether an edge found in the hand detection area HA is an edge of the moving object.
The edge information is information related to an edge in an image. The edge is a change point of a brightness of an image (for example, a point where a first order differential of a space function of brightness has a local maximum or a local minimum or a point where a second order differential of the space function of brightness crosses zero).
The processor 12 turns on the light source 171 so as to illuminate the hand detection area at least at the time of being photographed by the camera, whereby a difference in brightness between the monitoring object (e.g., a hand of a person) and a periphery thereof can be increased and an edge of the monitoring object can be more accurately identified. In particular, the light source 171 illuminates the hand detection area such that the inside and the outside of the hand detection area can be distinguished (e.g., by the amount of light or the color of light), thereby allowing the user of the protection object 30 to perceive a location where the hand is to be presented (i.e., the hand detection area).
The antitheft apparatus 10 repeatedly executes the monitoring of the hand detection area (S110) until the edge is detected or the standby processing of
If the edge is detected in step S110, the antitheft apparatus 10 executes acquisition of the hand information (S111).
More specifically, the processor 12 refers to the image acquired in step S110 to acquire the hand information (an example of “first event information related to an alert mode”). As an example, the processor 12 analyzes the image, thereby generating the hand information.
After step S111, the antitheft apparatus 10 executes user authentication (S112).
More specifically, the processor 12 authenticates the user of the protection object 30 by determining whether the hand information acquired in step S111 matches the correct hand information. As an example, the processor 12 refers to the user database (
If the user authentication in step S112 is successful, the antitheft apparatus 10 executes enabling of the alert mode (S113).
More specifically, the processor 12 enables the alert mode of the antitheft apparatus 10. Further, the processor 12 may modify the visual information to be output by the indicator 173.
With the end of step S113, the antitheft apparatus 10 ends the standby processing of
If the user authentication in step S112 fails, the antitheft apparatus 10 executes monitoring of the hand detection area (S110).
Standby processing according to the present embodiment will be described.
The antitheft processing of
As shown in
More specifically, the processor 12 acquires an image from a camera via the input/output interface 13. Here, the processor 12 may control at least one of the position or the posture of the camera as needed. The processor 12 analyzes the acquired image, thereby determining whether the protection object 30 has moved. As an example, the processor 12 can determine that the protection object 30 has moved when at least one of the following conditions is satisfied:
Alternatively, the antitheft apparatus 10 may determine that the protection object 30 has moved when the connection to the protection object 30 is broken.
If the movement of the protection object 30 is detected in step S120, the antitheft apparatus 10 executes outputting of an alarm (S121).
More specifically, the processor 12 causes the alarm device 172 to output an alarm for stimulating a sense of, for example, a person in the periphery of the alarm device 172 or the user of the protection object 30. For example, the processor 12 can perform at least one of the following:
If the movement of the protection object 30 is not detected in step S120, or after step S121, the antitheft apparatus 10 executes monitoring of the hand detection area (S122).
More specifically, the processor 12 acquires an image showing the state of the hand detection area from a camera via the input/output interface 13. Here, the processor 12 may control at least one of the position or the posture of the camera as needed to capture the hand detection area. The processor 12 performs an edge analysis on the acquired image data, thereby obtaining edge information. The processor 12 refers to the edge information and monitors an edge of a biological body or an object.
The processor 12 turns on the light source 171 so as to illuminate the hand detection area at least at the time of being photographed by the camera, whereby a difference in brightness between the monitoring object (e.g., a hand of a person) and a periphery thereof can be increased and an edge of the monitoring object can be more accurately identified. In particular, the light source 171 illuminates the hand detection area such that the inside and the outside of the hand detection area can be distinguished (e.g., by the amount of light or the color of light), thereby allowing the user of the protection object 30 to perceive a location where the hand is to be presented (i.e., the hand detection area).
If the edge is detected in step S122, the antitheft apparatus 10 executes acquisition of the hand information (S123).
More specifically, the processor 12 refers to the image acquired in step S122 to acquire the hand information (an example of “first event information related to an alert mode”). As an example, the processor 12 analyzes the image, thereby generating the hand information.
After step S123, the antitheft apparatus 10 executes user authentication (S124).
More specifically, the processor 12 authenticates the user of the protection object 30 by determining whether the hand information acquired in step S123 matches the correct hand information. As an example, the processor 12 refers to the user database (
If the user authentication in step S124 is successful, the antitheft apparatus 10 executes disabling of the alert mode (S125).
More specifically, the processor 12 disables the alert mode of the antitheft apparatus 10. Further, the processor 12 may modify the visual information to be output by the indicator 173.
Here, when the alarm device 172 is outputting an alarm with the alert mode determined to be disabled, the processor 12 stops outputting the alarm. Accordingly, even if the user of the protection object 30 accidentally triggers the alarm device 172, the outputting of the alarm can be stopped immediately.
With the end of step S125, the antitheft apparatus 10 ends the antitheft processing of
If the user authentication in step S124 fails, the antitheft apparatus 10 executes monitoring the movement of the protection object (S120).
If the edge is not detected in step S122, the antitheft apparatus 10 executes monitoring of the movement of the protection object (S120).
Power supply control processing according to the present embodiment will be described.
The power supply control processing of
The power supply mode of the antitheft apparatus 10 has been enabled (that is, step S104 of
As shown in
More specifically, the processor 12 acquires an image showing a state of the no-entry area (i.e., an image obtained by capturing a range including the no-entry area) from the camera via the input/output interface 13. Here, the processor 12 may control at least one of the position or the posture of the camera as needed to capture the no-entry area. The processor 12 performs an edge analysis on the acquired image data, thereby obtaining edge information. The processor 12 refers to the edge information and monitors an edge of a biological body or an object.
The processor 12 turns on the light source 171 so as to illuminate the no-entry area at least at the time of being photographed by the camera, whereby a difference in brightness between the monitoring object and a periphery thereof can be increased and an edge of the monitoring object can be more accurately identified.
If the edge is detected in step S130, the antitheft apparatus 10 executes an entry determination (S131).
More specifically, the processor 12 refers to the edge information (for example, a position of an edge) obtained in step S130 to determine whether a biological body or an object has entered the no-entry area.
As an example, when the antitheft apparatus 10 finds an edge in the no-entry area, the antitheft apparatus 10 determines that the edge has appeared due to a biological body or an object having entered the no-entry area (in other words, the antitheft apparatus 10 determines that a biological body or an object has entered the no-entry area).
However, even if the antitheft apparatus 10 finds an edge of a predetermined object in the no-entry area, the antitheft apparatus 10 can ignore the edge. For example, the predetermined object is the protection object 30 and property (such as a table, eating utensils, food or beverages, a menu, or a book) that need not be protected from radio waves. When the predetermined object is a stationary object that is present in the no-entry area, for example, by registering position information of an edge of the stationary object as a whitelist before start of wireless power supply, the antitheft apparatus 10 can determine whether an edge found inside the no-entry area during the wireless power supply can be ignored. Alternatively, the antitheft apparatus 10 may recognize at least one of the predetermined object or another biological body or an object (in other words, a biological body or an object that needs to be protected from radio waves) from an image through image recognition processing. Accordingly, it is possible to determine which object or biological body an edge found in the no-entry area belongs to.
In particular, using edge information enables a positional relationship between a biological body or an object and the no-entry area to be accurately comprehended. Therefore, even when the biological body or the object and the protection object 30 coexist in a limited space, wireless power supply can be performed in a proactive manner as long as the biological body or the object is at a safe position, but when the biological body or the object erroneously enters the no-entry area, the event can be accurately detected and the power transmission beam can be stopped.
When the antitheft apparatus 10 determines in step S131 that a biological body or an object has entered the no-entry area, the antitheft apparatus 10 executes temporary stoppage of the power supply (S132).
More specifically, the processor 12 causes the power transmitting unit 15 to temporarily stop radiation of the power transmission beam. This can prevent the biological body (e.g., a hand of a person) or the object from being radiated with a high-power transmission beam.
After step S132, the antitheft apparatus 10 executes monitoring of the no-entry area (S130).
If the edge is not detected in step S130, or if it is determined in step S132 that a biological body or an object has not entered the no-entry area, resumption of the power supply is executed (S133).
More specifically, the processor 12 resumes the radiation of the power transmission beam by the power transmitting unit 15.
However, the antitheft apparatus 10 omits the resumption of the power supply (S133) if the radiation of the power transmission beam by the power transmitting unit has not been stopped.
After step S133, the antitheft apparatus 10 executes monitoring of the no-entry area (S130).
When end conditions are satisfied, the antitheft apparatus 10 ends the power supply control processing (
Here, the power transmission area refers to an area in which the antitheft apparatus 10 provides wireless power supply. The power transmission priority is an index used by the antitheft apparatus 10 to determine the target power reception apparatus from a plurality of active power reception apparatuses (which may include the protection object 30). For example, the power transmission priority can be determined based on a remaining battery life of the power reception apparatus, history of use by a user with respect to the power reception apparatus, or a combination thereof. The power reception apparatus having become active means that the power reception apparatus is in a wait state for wireless power supply. For example, the power reception apparatus can become active as a trigger when the power reception apparatus changes to a state (a position or a posture) that enables the power reception apparatus to receive power, when the power reception apparatus changes to a communicable state, or when the remaining battery life of the power reception apparatus 30 drops to or below a threshold.
Let us assume that a first power reception apparatus (for example, a smartphone) and a second power reception apparatus (for example, a laptop computer) are present in a same power transmission area and that wireless power supply to the first power reception apparatus is being performed. When the remaining battery life of the second power reception apparatus becomes depleted due to use of the second power reception apparatus by a user, the power transmission priority of the second power reception apparatus becomes higher than the power transmission priority of the first power reception apparatus. When the antitheft apparatus 10 detects the inversion of the power transmission priorities, the antitheft apparatus 10 can temporarily stop the wireless power supply to the first power reception apparatus and start wireless power supply to the second power reception apparatus (switching of target power reception apparatuses).
As described above, the antitheft apparatus 10 according to the present embodiment acquires event information that is a trigger for enabling the alert mode, and enables the alert mode. If the alert mode is enabled, the antitheft apparatus 10 monitors the movement of the protection object 30. If the movement of the protection object 30 is detected, the antitheft apparatus 10 outputs an alarm. Accordingly, the protection against the theft of the protection object 30 (i.e., the alert mode of the antitheft apparatus 10) can be switched between enabling and disabling, and when the protection is enabled, an alarm can be output in response to the act of taking away the protection object 30.
The event information that is a trigger for enabling the alert mode may be hand information. This makes it possible to enable the alert mode without using a part, such as a face, that a person often feels uncomfortable or suspicious about being photographed. The hand information may include information related to a biometric characteristic of a hand of a person. This allows the user authentication based on the biometric characteristic of the user of the protection object 30 and eliminates the need for the user to memorize any information necessary for the user authentication. The hand information may include at least one piece of information related to one or more gestures represented by a hand of a person. Accordingly, even if it is difficult to obtain a fine image, it is possible to prevent overlooking the event information that is a trigger for enabling the alert mode. Further, the gesture that is a trigger for disabling the alert mode may be the same as the gesture that is a trigger for enabling the alert mode. This can reduce the burden of memorizing the gesture on the user of the protection object 30. The antitheft apparatus 10 may refer to an image obtained by photographing a range including a predetermined area to acquire the event information that is a trigger for enabling the alert mode, and may turn on the light source so as to illuminate the predetermined area at least when the image is photographed. This can improve the detection accuracy of the edge in the predetermined area and prevent overlooking the event information that is a trigger for enabling the alert mode.
The antitheft apparatus 10 may acquire the hand information that is a trigger for enabling a power supply mode and enable the power supply mode. At least one of the hand information that is a trigger for enabling the alert mode or the hand information that is a trigger for disabling the alert mode may be the same as the hand information that is a trigger for enabling the power supply mode. This allows the user of the protection object 30 to register the event information for controlling the alert mode of the antitheft apparatus 10 without additional work, simply by registering the event information for enabling the power supply mode at the start of using the wireless power supply service.
The antitheft apparatus 10 may refer to an image obtained by photographing a range including a predetermined area to acquire the event information for controlling the alert mode. The antitheft apparatus 10 may acquire the event information that is a trigger for enabling the power supply mode and enable the power supply mode. When the power supply mode is enabled, the antitheft apparatus 10 may refer to an image obtained by capturing a range including the no-entry area defined in the vicinity of the protection object 30 as compared with the predetermined area to monitor the entry of the moving object into the no-entry area. When the antitheft apparatus 10 detects the entry of the moving object, the antitheft apparatus 10 may stop the radiation of the power transmission beam to the protection object 30. Accordingly, the user of the protection object 30 can control the alert mode without stopping the radiation of the power transmission beam. In addition, the antitheft apparatus 10 can prevent the moving object (e.g., a hand of a person) from being radiated with a high-power transmission beam.
The antitheft apparatus 10 may cause the alarm device 172 installed in the periphery of the protection object 30 to output an alarm. This makes it possible to attract the attention of a person in the periphery of the alarm device 172. When the alarm device 172 is outputting an alarm with the alert mode determined to be disabled, the antitheft apparatus 10 may stop outputting the alarm. Accordingly, even if the user of the protection object 30 accidentally triggers the alarm device 172, the outputting of the alarm can be stopped immediately. The antitheft apparatus 10 may cause a communication apparatus carried by the user of the protection object 30 to output an alarm. This makes it possible to notify the user at an early stage of the act of taking away the protection object 30. The antitheft apparatus 10 may cause the indicator 173 to output different visual information depending on whether the alert mode is enabled or disabled. This allows a person in the periphery of the indicator 173 (e.g., the user of the protection object 30) to perceive the state of the alert mode.
Modifications of the present embodiment will be described.
Modification 1 will be described. Modification 1 is an example of providing a user of the protection object 30 with information related to improving a charging rate.
The antitheft apparatus 10 according to Modification 1 provides a user with information related to improving a charging rate as a trigger when an event of a decline in the charging rate occurs. For example, the event of a decline in the charging rate is at least one of the following:
For example, the antitheft apparatus 10 provides the user with information related to improving a charging rate by executing at least one of the operations described below.
The message described above may be an image (including imaged texts) or audio that prompts the user to move a biological body (for example, a hand of the user) or an object (for example, an electronic equipment that needs to be protected from radio waves) away from the protection object 30. Alternatively, the message described above may be an image (including imaged texts) or audio that prompts the user to move the protection object 30 away from a biological body or an object.
With the antitheft apparatus according to Modification 1, the user can be made aware of desirable actions in order to improve a charging rate and can be prompted to take such actions. Accordingly, user experience of a wireless power supply service can be prevented from deteriorating due to a drop in charging rate caused by an involuntary action of the user.
The storage device 11 may be connected to the antitheft apparatus 10 via a network NW. The storage device 31 may be connected to the protection object 30 via the network NW.
In the above description, an example has been described in which the steps are executed in a specific order in each processing, but the order in which the steps are executed is not limited to the described example as long as there is no dependency.
In the embodiment, an example has been described in which the antitheft system 1 provides the antitheft service in combination with the wireless power supply service. However, the antitheft system 1 may provide the antitheft service in combination with a service different from the wireless power supply service, or may provide only the antitheft service. In other words, the antitheft apparatus need not include the power transmitting unit 15. Similarly, the protection object 30 need not include the power receiving unit 35. When the antitheft system 1 provides the antitheft service in combination with a service different from the wireless power supply service, the term “wireless power supply service” in the above description can be read as any service, as appropriate.
In the embodiment, an example where the antitheft apparatus 10 receives a power supply request has been shown. However, the antitheft apparatus 10 may perform wireless power supply to any of the protection objects 30 even without receiving a power supply request. As an example, the antitheft apparatus 10 may perform wireless power supply according to a predetermined schedule or determine necessity of wireless power supply by collecting information on remaining battery capacity from the protection object 30.
In the embodiment, an example of the antitheft apparatus 10 including one power transmitting unit 15 has been described. However, the antitheft apparatus 10 may include a plurality of individually controllable power transmitting units 15. Furthermore, the power transmitting unit 15 and other constituent elements (for example a control unit) in the power transmission apparatus 10 may be configured as separate apparatuses that are capable of communicating with each other. In other words, the antitheft apparatus 10 need not include the power transmitting unit 15. In this case, the power transmitting unit 15 can be built into an apparatus that includes a communication interface for receiving a control from the antitheft apparatus 10 and a processor (for example, a microcomputer) for driving the power transmitting unit 15 in accordance with the control from the antitheft apparatus 10. Further, the power transmitting unit 15 and the control unit that controls the power transmitting unit 15 may be configured as one or more apparatuses separated from the antitheft apparatus 10.
In a similar manner, the power receiving unit 35 and other constituent elements (for example a control unit) in the protection object 30 may be configured as separate apparatuses that are capable of communicating with each other. In other words, the protection object 30 need not include the power receiving unit 35. Further, the power receiving unit 35 and the control unit that controls the power receiving unit 35 may be configured as one or more apparatuses separated from the protection object 30.
In the embodiment, an example has been shown in which the protection object 30 corresponds to the power reception apparatus (that is, an apparatus that receives a wireless power supply service). However, the protection object 30 may not correspond to the power reception apparatus. The protection object 30 may be an article that cannot be a power reception apparatus (e.g., a wallet, a watch, an accessory, clothing, a bag, a document, a book, a stationery, or an electronic equipment that does not support a wireless charging function). Alternatively, a plurality of articles (which may include an article corresponding to the power reception apparatus) may be treated as the protection object 30.
In the embodiment, an example of the antitheft apparatus 10 causing the alarm device 172 to output an alarm has been described. However, the antitheft apparatus may cause the protection object 30 to output an alarm. For example, the antitheft apparatus 10 may cause the protection object 30 to output an alarm by sound or an alarm by light. Accordingly, even when the protection object 30 is taken away from an initial position (e.g., a position of the protection object 30 when the alert mode of the antitheft apparatus 10 is enabled), it is possible to attract the attention of a person in the periphery of the protection object 30.
In the embodiment, an example of the antitheft apparatus 10 causing the alarm device 172 to output an alarm has been described. However, the antitheft apparatus may more reliably prevent the theft of the protection object 30 by triggering a security apparatus. The security apparatus is, for example, an electric gate that can block the passage of people by being locked or closed by a control signal.
In the embodiment, an antenna is given as an example of the beam-emitting element. However, when a lightwave is used as the power-supplying electromagnetic wave, the beam-emitting element may be, for example, a light emitting device such as a laser device or an LED chip.
Although the embodiment of the present invention has been described in detail above, the scope of the present invention is not limited to the above-described embodiment. Further, various improvements and changes can be made to the above-described embodiment without departing from the gist of the present invention. The above-described embodiment and modifications can be combined.
Number | Date | Country | Kind |
---|---|---|---|
2021-075574 | Apr 2021 | JP | national |
This application is a Continuation Application of No. PCT/JP2022/009856, filed on Mar. 8, 2022, and the PCT application is based upon and claims the benefit of priority from Japanese Patent Application No. 2021-075574, filed on Apr. 28, 2021, the entire contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2022/009856 | Mar 2022 | US |
Child | 18484659 | US |