1. An imaging intrusion detection method for an imaging intrusion detection system by using an image recognition technique, the imaging intrusion detection method comprising:
generating a plurality of collimated light beams by respectively combining condensing lenses with a plurality of light sources and illuminating a security area by the plurality of collimated light beams to form dot lighting;
obtaining a dot image of the security area to which the dot lighting is illuminated by an intrusion monitoring camera and storing the obtained dot image in a memory as reference dot information; and
photographing the security area to which the dot lighting is illuminated at predetermined intervals to obtain an input image, extracting dot information from the input image to compare the dot information with the reference dot information, and determining whether there is intrusion in the security area according to a change of a dot based on a result of comparison.
2. The imaging intrusion detection method of claim 1, further comprising:
photographing a first image of the security area in which an illumination lamp is turned on by the intrusion monitoring camera and storing the first image in the memory as the reference image information; and
photographing a second image of the security area in which the illumination lamp is turned on by the intrusion monitoring camera when it is determined that there is an intrusion and comparing the second image with the reference image information to finally determine an intrusion.
3. The imaging intrusion detection method of claim 1, wherein the determining of whether there is an intrusion includes comparing a number of dots included in the dot information and a number of dots included in the reference dot information, and determining that there is an intrusion when a difference between them is higher that a predetermined value.
4. The imaging intrusion detection method of claim 1, wherein the determining of whether there is an intrusion includes comparing brightness of the dot information and brightness of the reference dot information, and determining that there is an intrusion when a difference between them is higher that a predetermined value.
5. The imaging intrusion detection method of claim 1, wherein the determining of whether there is an intrusion includes comparing positions of dots included in the dot information and positions of dots included in the reference dot information and determining that there is an intrusion when a difference between them is higher that a predetermined value.
6. The imaging intrusion detection method of claim 1, wherein the determining of whether there is intrusion includes comparing shapes or sizes of dots included in the dot information and shapes or sizes of dots included in the reference dot information and determining that there is an intrusion when a difference between them is higher that a predetermined value.
7. The imaging intrusion detection method of claim 1, further comprising:
obtaining a difference between an image of the security area when the dot lighting is turned on and an image of the security area when the dot lighting is turned off, and extracting the reference dot information or the dot information.
8. The imaging intrusion detection method of claim 1, wherein the plurality of light sources are arranged in a form of a zigzag with an optical axis of the intrusion monitoring camera as its center.
9. An imaging intrusion detection system using an image recognition technique, the imaging intrusion detection system comprising:
a dot lighting unit in which a plurality of light sources are respectively combined with condensing lenses to form a plurality of collimated light beams, and that illuminates a security area with the plurality of collimated light beams to form dot lighting; and
an intrusion determining unit that sets a dot image of the security area in which the dot lighting is illuminated as reference dot information, and when an input image for the security area is obtained, extracts dot information from the input image, compares the dot information with the reference dot information, and analyzes a change of a dot to determine whether there is an intrusion.
10. The imaging intrusion detection system of claim 9, wherein the intrusion determining unit, based on a result of comparison of the extracted dot information and the reference dot information, analyzes at least one of a number of dots, brightness of a dot, size of a dot, and shape of a dot to determine whether there is an intrusion.
11. The imaging intrusion detection system of claim 9, wherein the intrusion determining unit, based on a result of comparison of the extracted dot information and the reference dot information, calculates a size of an object that has trespassed in the security area by using the area and number of dots that have changed.
12. The imaging intrusion detection system of claim 9, wherein the intrusion determining unit, when a change of dots occurs based on a result of comparison of the extracted dot information and the reference dot information, traces a moving path of an object that has trespassed in the security area by using a speed of change of the dots.
13. The imaging intrusion detection system of claim 9, wherein the intrusion determining unit measures an angle of view of a camera by positions in the security area, stores a lookup table based on the measured angle of view in a memory, measures a size of an object that has trespassed in the security area based on referring to the lookup table with an angle of view measured in a security area to determine whether there is an intrusion.
14. The imaging intrusion detection system of claim 9, wherein the intrusion determining unit determines whether a light source is out of order based on a difference between a number of dots included in the extracted dot information and a number of dots included in the reference dot information.
15. The imaging intrusion detection system of claim 9, wherein the dot lighting unit drives the plurality of light sources with a pulse signal, provides instantaneous current that is larger that a predetermined current to the plurality of light sources, and synchronizes the driving of the plurality of light sources with a photographing time of a camera.
The claims below are in addition to those above.
All refrences to claims which appear below refer to the numbering after this setence.
1. A method for utilizing an object that is dependent on object data comprising:
(a) storing a lightweight representation of the object as object data separate from a file containing an instance of the object, wherein:
(i) the file comprises a drawing;
(ii) the object comprises a drawing component; and
(iii) the object data comprises a drawing component property;
(b) obtaining a request to load the file;
(c) determining if the object data is available; and
(d) if the object data is available:
(1) obtaining the object data; and
(2) utilizing the object data to resurrect the object graphically in the drawing.
2. The method of claim 1 further comprising displaying an empty graphical representation if the object is not available.
3. The method of claim 1 further comprising storing a universally unique identifier (UUID) with the file to match the object and the object data.
4. The method of claim 1 further comprising storing a reference to the object data in the file.
5. The method of claim 4 wherein the reference is a uniform resource locator (URL).
6. The method of claim 1 wherein the object data is stored on a secure server and wherein the determining if the object data is available further comprises determining if the request to load the file provides proper access permissions for the object data.
7. The method of claim 6 wherein the request to load the file originates from outside of a network where the object data is stored and the object data is not available because a network security mechanism determines that the request does not provide the proper access permissions.
8. The method of claim 1, wherein:
the separate location is on a supplier’s network;
a supplier maintains and updates the object data; and
the drawing component comprises a part offered by the supplier that is used in the drawing.
9. The method of claim 1 wherein the utilizing the object data occurs in real time across a network.
10. A computer implemented system for utilizing an object that is dependent on object data comprising:
(a) an object dependent on object data, wherein the object data comprises a lightweight representation of the object;
(b) a file containing an instance of the object, wherein:
(i) the file comprises a drawing;
(ii) the object comprises a drawing component; and
(iii) the object data comprises a drawing component property;
(c) means for storing the object data in a separate location from the file;
(d) means for obtaining a request to load the file;
(e) means for determining if the object data is available, and if the object data is available:
(1) means for obtaining the object data; and
(2) means for utilizing the object data to resurrect the object graphically in the drawing.
11. The system of claim 10 further comprising means for displaying an empty graphical representation if the object data is not available.
12. The system of claim 10 further comprising a universally unique identifier (UUID) that may be utilized to match the object and the object data.
13. The system of claim 10 wherein the file further comprises a reference from the object to the object data.
14. The system of claim 13 wherein the reference is a uniform resource locator (URL).
15. The system of claim 10 further comprising:
a secure server where the object data is stored; and
wherein the means for determining if the object data is available further comprises means for determining if the request to load the file provides proper access permissions for the object data.
16. The system of claim 15 wherein the request to load the file originates from a network other than a network that hosts the secure server where the object data is stored and the object data is not available because a network security mechanism determines that the request does not provide the proper access permissions.
17. The system of claim 10 wherein:
the separate location is on a supplier’s network;
a supplier maintains and updates the object data; and
the drawing component comprises a part offered by the supplier that is used in the drawing.
18. The system of claim 10 wherein the means for utilizing the object data occurs in real time across a network.
19. An article of manufacture embodying logic for performing a method for utilizing an object that is dependent on object data, the method comprising:
(a) storing a lightweight representation of the object as object data separate from a file containing an instance of the object, wherein:
(i) the file comprises a drawing;
(ii) the object comprises a drawing component; and
(iii) the object data comprises a drawing component property;
(b) obtaining a request to load the file;
(c) determining if the object data is available; and
(d) if the object data is available:
(1) obtaining the object data; and
(2) utilizing the object data to resurrect the object graphically in the drawing.
20. The article of manufacture of claim 19, the method further comprising displaying an empty graphical representation if the object data is not available.
21. The article of manufacture of claim 19, the method further comprising storing a universally unique identifier (UUID) with the file to match the object and the object data.
22. The article of manufacture of claim 19, the method further comprising storing a reference to the object data in the file.
23. The article of manufacture of claim 22 wherein the reference is uniform resource locator (URL).
24. The article of manufacture of claim 19 wherein the object data is stored on a secure server and wherein the determining if the object data is available further comprises determining if the request to load the file provides proper access permissions for the object data.
25. The article of manufacture of claim 24 wherein the request to load the file originates from outside of a network where the object data is stored and the object data is nor available because a network security mechanism determines that the request does not provide the proper access permissions.
26. The article of manufacture of claim 19 wherein:
the separate location is on a supplier’s network;
a supplier maintains and updates the object data; and
the drawing component comprises a part offered by the supplier that is used in the drawing.
27. The article of manufacture of claim 19 wherein the utilizing the object data occurs in real time across a network.
28. The method of claim 1 wherein the object data comprises actual text content for a document.
29. The method of claim 1 wherein the object data comprises formatting information for displaying the object.
30. The system of claim 10 wherein the object data comprises actual text content for a document.
31. The method of claim 10 wherein the object data comprises formatting information for displaying the object.
32. The article of manufacture of claim 19 wherein the object data comprises actual text content for a document.
33. The article of manufacture of claim 19 wherein the object data comprises formatting information for displaying the object.
34. The method of claim 1 wherein the drawing is a computer aided design (CAD) drawing.
35. The system of claim 10 wherein the drawing is a computer aided design (CAD) drawing.
36. The article of manufacture of claim 19 wherein the drawing is a computer aided design (CAD) drawing.