Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURITY SYSTEM
Document Type and Number:
WIPO Patent Application WO/2000/008540
Kind Code:
A2
Abstract:
A security system using Internet according to the present invention can provide various door lock services, such as a user's information modification, a foreigner's identification, a door lock control, a lock state checking, a safeguard service, and a priority order service by making a successively mutual communication operation between main server and user's personal computer via Internet for the purpose of reciprocating a corresponding service page on various door lock services. For providing a foreigner's identification service, a peripheral external equipment is connected electrically to the personal computer and the main server. The peripheral external equipment includes an external door equipment for reciprocating a call service communication between a foreigner and user and a sensing device for sensing a change of user's door environment. A conversion device which can sense a fine change of a predetermined state into another state may be included in the sensing device.

Inventors:
KIM JOA SOON (KR)
Application Number:
PCT/KR1999/000418
Publication Date:
February 17, 2000
Filing Date:
July 31, 1999
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KIM JOA SOON (KR)
International Classes:
G07C9/00; (IPC1-7): G06F/
Foreign References:
CN1156673A1997-08-13
EP0331654A21989-09-06
Other References:
PATENT ABSTRACTS OF JAPAN vol. 17, no. 472 27 August 1993 & JP 05 113 066 A 07 May 1993
Download PDF:
Claims:
CLAIMS What is claimed is :
1. A security system using an internet in which a subscriber from anywhere based on outer door can freely and remotely manipulate a door lock includes: a plural of controlling means having a construction in which a controI device it is possible to communicate with said internet and a display device are constituted so that the remote manipulation may be helped to the subscriber; and, a hosting means being connected electrically to each of said many controlling means for performing an intermediation function of the door lock service between said many computing means and said hosting means in response to a subscFiber's desired selection operation, via the internet.
2. The security system using the internet according to ciaim 1, wherein the door lock service includes a lock control service so that ado3r lock establishment page and a door lock release page may be given and taken between said many controlling means and said hosting means.
3. The security system using the internet according to claim 2, wherein the lock control service in the door lock service further includes a lock state checking page for checking a state of a subscriber's dca¢ lock.
4. The security system using the internet according to claim 2, wherein the door lock service. further includes a foreigner's identifi tication service so that a foreigner's identification service page may be reciprocated between said many control ! ing means and said hosting means.
5. The security system using the internet according to claim 2, wherein the door lock service. further includes an user's information service so that a priority order service page may be reciprocated between said many controlling means and said hosting means for authorizing a priority right to any special user of a subscriber's family.
6. The security system using the internet according to claim 5, wherein the user's information service in the door lock service further includes an user's information modification page.
7. The security system using the internet according to claim 1, wherein the door look service includes a safeguard service for oveflooking a. foreigner's invasion into a subscriber's inter door.
8. The security system using the internet according to claim 2, wherein the door lock service further includes a safeguard service for overlooking a foreigner's invasion into a subscriber's inter door.
9. The security system using the internet according to claim 2 or claim 3, wherein each of the door lock establishment page, the door lock release page, and the lock state checking page in the lock control service constitutes a. subscriber'information page. an user's security number page. and a submit icon.
10. The security system using the internet according to claim 4. wherein the foreigner's identification page in the foreigner's identification service constitutes a subscriber's information page, an outdoor mode fixation icon, an outdoor mode break icon. a next icon, and a submit icon.
11. The security system using the internet according to claim 5 or claim 6, wherein the safeguard service page includes a subscriber's information page, an user's security number page, a safeguard service establishment icon, a safeguard service release icon, a seeing icon, and a submit icon.
12. The security system using the internet according to claim 10, wherein the outdoor mode fixation icon and the submit icon in the foreigner's identification page are continuously clicked so as to set up an outdoor mode of the security system.
13. The security system using the internet according to claim 10, wherein the outdoor mode fixation icon, the next icon, and the submit icon in the foreigner's identification page are continuously clicked so as to see a foreigner's image on said display device of user's said controt ! ing means.
14. The security system using the internet according to claim 10, wherein the next icon and. the submit icon in the foreigner's identification page are continuously clicked so as to identify foreigner's image when an outdoor mode of the security system is not set up.
15. A security system using an internet in which a subscriber from anywhere based on outer door can not only freely and remotely manipulate a door lock control operation but also identify a foreigner at a subscriber's door includes : a plural of controlling means having a construction in which a control device it is possible to communicate with said internet and a display device are constituted so that the remote manipulation may be helped to the subscriber : a hosting means being connected electrically to each of said many controlling means for performing an intermediation function of various kinds of item selection pages between said many computing means and said hosting means in response to a subscriber's desired selection operation, via the internet; and, a plural of peripheral external equipments each being connected electrically to said controlling means and said hosting means for generating a call signal and first sense signal. these signals being entered into said hosting means.
16. The security system using the internet according to claim 15, said hosting means forces to control said peripheral external <BR> <BR> equipntent after reciprocating a door lock estabtishment page or/and a door lock release page with a corresponding one of said many controtting means when a selection of a door iock establishment or/and a door lock release in the iock contro ! operation is made.
17. The security system using the internet according to claim 16 said hosting means forces to cause an executive setup data or/and an executive release data to be provided to said peripheral external equipment upon control of said peripheral external equipment.
18. The security system using the internet according to claim 15 said hosting means forces to cause second sense signal to be taken from said peripheral external equipment so as to check a state of a door lock, by reciprocating a lock state checking page with said controlling means when a selection of a door lock checking in the lock control operation is made.
19. The security system using the internet according to claim 15, said hosting means forces to cause the first sense signal to be taken from said peripheral external equipment upon receipt of a generated cah sionat. by reciprocating a foreigner's identification page with said contro) ting means.
20. The security system using the internet according to claim 19, wherein the foreigner's identification page constitutes a subscriber's 32 information page an outdoor mode fixation icon. an outdoor mode break icon a next icon, and a submit icon.
21. The security system using the internet according to claim 20. wherein the outdoor mode fixation icon and the submit icon in the foreigner's identification page are continuously clicked so as to set up an outdoor mode of the security system.
22. The security system using the internet according to claim 20, wherein the outdoor mode fixation icon, the next icon. and the submit icon in the foreigner's identification page are continuously clicked so as to see a foreigner's image on said display device of user's said controlling means.
23. The security system using the internet according to claim 20, wherein the next icon and the submit icon in the foreigner's identification page are continuously clicked so as to identify foreigner's image when an outdoor mode of the security system is not set up.
24. The security system using the internet according to claim 15, wherein said hosting means forces to cause the said peripheral external equipment to sense a change of the peripheral environment conditions of a subscriber's door and to a foreigner's illegal invasion to be known to the subscriber upon selection of a safeguard service.
25. A security system using an internet in which a subscriber from anywhere based on outer door can recognize the fact that a foreigner's illegal invasion had beerl incurred at a subscriber's inter door by paging using a subscriber's contact caH number includes : a pleural of controlling means having a construction in which a control device it is possible. to communicate with said internet and a display device are constituted so that a remote manipulation may be helped to the subscriber : a hosting means being connected electrically to each of said many controlling means for performing a centra ! contro ! function : and. a plural of peripheral external equipments each being connected electrically to said controlling means and said hosting means for generating a call signal and first sense signal : wherein said hosting means can teach the foreigner's illegal invasion to the subscriber by taking first sense signal from said peripheral external equipment after a reciprocal communication between said hosting means and said controlling means via the internet resulting in a safeguard service page providence, wherein the door lock service includes a lock control service so that a door ! ock establishment page and a door lock release page may be given and taken between said many control ting means and said hosting means.
Description:
SECURITY SYSTEM BACKGROUND OF THE INVENTION Field of the invention The present invention relates to a security system in which a subscriber can remotely control his door lock and is provided with a caller's image using internet and one's personal computer (hereinafter , be called as "PC"), and in particular to a security system in which a subscriber can not only freely manipulate a door lock control operation but also identify a foreigner upon receipt of a stored caller's image/sound file from main sever by making a mutual communication operation between internet and user's PC upon foreigner's visit. Further, the present invention relates to a security system in which an illegal invasion can be safeguarded and watched over by sensing a state of the peripheral environment of subscriber's door. Furthermore, the present invention relates to a conversion device in a security system being capable of converting an atmospheric pressure into an electric signal and process thereof.

Description of the prior Art Generally, a conventional mechanical door lock system is still public. With having been rapidly developed in field of electronic industries, however, conventional electronic door lock system in field of security industries has been actively researched and developed. In point of the conventional electronic door lock system, security number type electronic door lock system, security number type eectronic card system. eyebaH type door took system, fingerprint type door lock system, and so on are set forth. The security number type electronic card system in the conventional electronic door lock system has weak point wherein it is always carried with by user. Moreover, the eyeball type door lock system and fingerprint type door lock system are very expensive in view of customers. Further, security system besides the above conventional electronic door lock system is charged of by patrol service business bodys. business cost and equipment set-up cost in such patrol service business bodys are applied to be heavily load on customers. Up to recently, another type electronic card system has been developed. This is true for a radio communication type electronic card system which has the same shortage as the security number type electronic card system.

In conventional conversion devices, a diaphragm in which a distortion stress is formed after converting an input pressure into the stress is included. Aconversion part capable of converting a generated electric power into an electric signal is further consisted of. Also, a pressure resisted device and en electrostatic capacitive device in kinds of the conventional conversion devices were generally.

The pressure resisted conversion device has a high stability comparing to a metallic conversion device according to a mechanical displacement because of have no deterioration in a contact part. The electrostatic capacitive conversion device failed to sense a fine pressure change or a sonic characteristic as a change of an electrode plate acting as the diaphragm because the electrostatic capacitive conversion device should make change of an electrostatic capacitance depending on a displacement of a distance between electrode plates which face each other. The electrostatic capacitance could not be measured in response to a displacement of a distance between electrode ptates and a change of a dielectric constant at a space region formed between both electrode plates. Resultingly.. the conventional conversion devices had a shortage which cannot sense a fine change of a atmospheric pressure.

SUMMARY OF THE INVENTION It is an object of the present invention to provide a security system having a capability of helping to cause a door lock control operation to be freely and remotely manipulated by subscriber from anywhere based on outer door, using an internet and one's PC.

! t is another object of the present invention to provide a security system in which a mutual communication operation between internet and user's PC is made successively so that a subscriber can identify a foreigner who is a caller via his PC by being provided with a stored caller's image/sound file from main sever.

It is yet another object of the present invention to provide a security system in which a mutual communication operation between an internet and user's PC is made successively so that a remote subscriber from home can check a state of a door lock.

It is still another object of the present invention to provide a security system in which a mutual communication operation between an internet and user's PC is made successively so that a subscriber can freely change his personal information.

It is further object of the present invention to provide a secu- rity system which provides foreigner's illegal invasion into inter door to a subscriber by maki. ng successively a mutual communication operation between an internet and user's PC. upon that such fact is incurred.

It is further another object of the present invention to provide a conversion device in which a fine change of an atmospheric pressure can be sensed in response to a displacement of a distance and a change of a dielectric constant at a space region between both electrode plates.

It is furthermore another object of the present invention to provide a conversion device in which a fine change of an atmospheric pressure can be measured as an electrostatic capacitance or/and a voltage.

It is moreover object of the present invention to provide a process in which a conversion device can be manufactured.

To achieve the above objects according to an embodiment of the present invention, a security system using an internet in which a subscriber from anywhere based on outer door includes a plural of controlling means having a construction in which a control device it is possible to communicate with said internet and a display device are constituted so that the remote manipulation may be hetped to the subscriber : and, a hosting means being connected electrically to each of said many controlling means for performing an intermediation function of the door lock service between said many computing means and said hosting means in response to a subscriber's desired selection operation, via the internet. Further. A security system using an internet in which a subscriber from anywhere based on outer door can not only freely and remotely manipulate a door lock control operation but also identify a foreigner at a subscriber's door includes a pleural of controlling means having a construction in which a control device it is possible to communicate with said internet and a display device are constituted so that the remote manipulation may be helped to the subscriber ; a hosting means being connected electrically to each of said many controlling means for performing an intermediation function of various kinds of item selection pages between said many computing means and said hosting means in response to a subscriber's desired selection operation, via the internet : and, a plural of peripheral external equipments each being connected electrically to said controlling means and said hosting means for generating a call signal and first sense signal, these signals being entered into said hosting means. Furthermore, A security system using an internet in which a subscriber from anywhere based on outer door can recognize the fact that a foreigner's illegal invasion had been incurred at a subscriber's inter door by paging using a subscriber's contact call number includes a plural of controlling means having a construction in which a control device it is possible to communicate with said internet and a display device are constituted so that a remote manipulation may be helped to the subscriber : a hosting means being connected electrically to each of said many controlling means for performing a centra ! contro ! function : and. a plural of peripheral external equipments each being connected electrically to said controlling means and said hosting means for generating a call signal and first sense signal, wherein said hosting means can teach the foreigner's illegal invasion to the subscriber by taking first sense signal from said peripheral external equipment after a reciprocal communication between said hosting means and said controlling means via the internet resulting in a safeguard service page providence.

BRIEF DESCRIPTION OF DRAWINGS Fig. 1 shows a skeleton block diagram of construction of a security system according to an embodiment of the present invention.

Fig. 2 shows a detailed block diagram of some parts of the construction shown in Fig. l.

Fig. 3 shows a flow chart for explaining steps of entire operation of security system according to an embodiment of the present invention.

Fig. 4 shows a flow chart for explaining steps of diverse service providence operation according to an embodiment of the present invention when any one of diverse item selection icons is clicked on a home page remained at address of a corresponding web site, wherein <BR> Fig. 4a is a flow chart for explaining steps when a client clicksa subscription book icon, Fig.4b when a user's information modification icon is clicked, Fig. 4c when a lock establishment icon is clicked, Fig. 4d when a foreigner's identification icon is clicked, Fig. 4e when a lock release icon is clicked. Fig.4f when a lock state checking icon is clicked, Fig.4g when a safeguard service icon is clicked, and Fig. 4h is a flow chart for explaining steps when a priority order service icon is clicked.

7' Fig. 5 shows one part of manufacturing process of a conversion device according to an embodiment of the present invention.

DETA!LEDDESCR!PT!ON OF PREFERRED EMBODIMENT OF THE INVENTION Now, operation of security system using an internet according to an embodiment of the present invention will be explained in detail referring to attached drawings.

Fig. 1 shows a block diagram of construction of a security system using internet according to an embodiment of the present invention.

Referring to Fig. 1. a security system using an internet according to an embodiment of the invention includes main sever 100 as a host computer for being electrically connected to a plural of user's PCs 1,2, 3, 4,..., n for example, a desktop computer, a personal computer, a notebook computer, and all computers having a construction in which it is possible to communicate with an internet. Main sever 100 is electrically connected through a connector (not shown) to a plural of peripheral external equipments 10 and 20. each having external door equipment 200 positioned to outer door for communicating foreigner with one of user's family and sensing device 300 positioned to inter door for sensing a number of environment conditions on a door so as to overtook and watch a foreigner's illegal invasion as shown in Fig. 2. External door equipment 200 is electrically coupled to main sever 100 through a connector (not shown), and includes first sensing unit 240, door phone device 310 having call switch SW2, microphone MIC, and speaker SPK, electronic lock unit 320 in which it is electrically and electronically possible to manipulate a door lock control operation, second sensing unit 330, input unit 340, and alarm device 350. First sensing unit 240 is for sensing a state of electronic lock unit 320. In peripheral external equipments 10 and 20, sensing device 300 includes sensing part 410 which constitutes a pleural of sense units for generating various sense signals, comparison part 420 for comparing generated sense signals from sensing part 410 with a reference signal, and signal generation unit 430 for transferring a predetermined signal depending on the output of comparison part 420. One of sense units in sensing part 410 may be a conversion device 500 which can sense a fine change of a predetermined state into an another state.

If a client who will be a subscriber would like to subscribe a predetermined door lock service he continues to click via his PC and types. a corresponding address of a predetermined web site on his PC, for example www. xxx. com or www. xxx. co. kr. Then, home page related to the corresponding address is appeared on screen of his PC. The client clicks a desired one icon out of diverse item selection icons represented on home page. By clicking operation of the client, it is possible to be provided with various door lock services by making successively mutual communication operation between an internet and user's PC.

Fig. 3 shows a flow chart for explaining steps of the entire operation of a security system according to an embodiment of the present invention.

As shown in Fig. 3. a client can touch a desired door lock service after search work of a predetermined web site linked to the desired door lock service using his PC and then is provided with a corresponding home page file of the predetermined web site from main server 100. The corresponding home page is appeared on screen of his PC in step 600. When the client clicks a desired one icon out of various item selection icons represented on the corresponding home page in step 610, a corresponding service file related to the clicked item icon is provided. Here, various items say a company instruction, a subscription book, an user's information modification, a foreigner's identification, a door lock control, a lock state checking, a safeguard service, a priority order service, a products instruction, a products order, an idea development order, and a patent intermediation room Fig. 4 shows a flow chart for explaining steps of various door lock service operations in a security system according to an embodiment of the present invention, wherein Fig. 4a is a flow chart for explaining steps relating to when a client clicks a subscription book icon, and Fig.4b is a flow chart for explaining steps relating to when it is desired that a subscriber updates his information.

Referring to Fig. 4a. a subscription book page file is transferred from main server 100 to his PC when a client clicks a subscription book icon 800 with his mouse. On screen of his PC is appeared the transferred subscription book page having a subscription guidance icon 820 and a subscription entry book icon 830 in step 820.

If the subscription guidance icon 820 is clicked in step 811 a subscription guidance page file is transmitted from main server 100 to the client's PC on which the subscription guidance page including an applicant's guidance icon 850 and a fee guidance icon 860 is appeared in step 840. When the applicant's guidance icon 850 is clicked in step 841 a applicant's guidance page file is provided from main server 100 to the client's PC. At this time, the client is used to write out an applicant's guidance page by repeatedly performing practice after looking over it. A fee schedule page file is provided from main server 100 to the client's PC if the fee guidance icon 860 is clicked in step 841. Accordingly, the fee schedule page is appeared on the client's PC in step 861. From main server 100 to the client's PC is transmitted a subscription entry book page file if a subscription entry book icon 830 is clicked in step 811 in step 870. The transmitted subscription entry book page contains an agreements form, an application form, and a bill payment form. After reading the agreements the chent this up the agreements for the purpose of agreements offer, simultaneously with the bill payment form and the application form written for a client's information having a name/cornmercial Raine, a resident registration, an address, a contact call number, a desired D. a password, first and second security numbers, and so on in step 871.

The password do not necessarity require numerica ! order. For example, it is preferably in range of all characters with which it is possible to represent on screen of user's PC. symbols, colors, and lites with which it is possible to discriminate. The bill payment form includes an accounting bank, its branch. an account number, depositor, and a payment method. Resulting from operation of clicking submit icon by the client in step 872 after completion of writing out the transmitted subscription entry book page, the written out subscription entry book page is supplie to main server 100 through the client's PC, and is stored into a predetermined memory part out of user's information administration file server (not shown) in main server 100 in step 873. At this moment administrator may read out a content of the stored written out a subscription entry book page from the predetermined memory part out of user's information administration file server in main server 100. If administrator accepts a filled up agreements in the written out subscription entry book page, a re-written out a subscription entry book page with a predetermined allocated ID is returned to the client through his PC in step 874. Accordingly, the client is well aware about completion of agreements on receipt of the returned accepted agreements. Furthermore, the client is substantially a subscriber and then can take a certification for being provided with various door lock services.

Supposing that one group network out of a plural of group networks, linking electrically to a predetermined PC and a corresponding peripheral external equipment out of the group networks is registered and subscribed.

In Fig. 4b which shows steps of user's information modification, a subscriber's information page file is transmitted from main server 100 to user's PC when a subscriber clicks a user's information modification icon 900 in step 610., and then he types his ID and password into a predetermined space of the transmitted subscriber's information page. In case that the subscriber clicks a submit icon in step 911 after finished, main server 100 starts to look for a corresponding stored I D and password within user's information administration file server (not shown) and compares the corresponding stored ID and password with the transmitted typed ID and password in step 913. A user's information page file is provided from main server 100 to user's PC in step 920 if identified. The provided user's information page contains a user's information entry book page having user's information documents and item selection icons which point out a file icon, an edit icon, and a discovery icon. As some sub icons in a file icon are a new file icon, a print icon, a print establishment icon, and so on. Alto, a correction icon, an addition icon, a deletion icon, and so on are a sub icon of the edit icon. Using these above sub icons, therefore, a number of user and his information can be added and deleted, that is, some parts of user's information can be updated.

In case of a clicking operation of a submit icon by a subscriber after completion of a writing out operation user's information documents with a user's information entry book page and item selection icons in step 930. the written out user's information documents page fife is p-rovided to main server 100. Immediately on receipt of the provided a user's information documents page file main server 100 takes over user's information administration file server. Based on filled up correction data within the provided user's information documents, user's information administration file server starts to update a user's information in step 940. If not identified in step 913, an error message is generated from main server 100 and is transferred as a file to user's PC via an internet in step 950.

! f a subscriber clicks a lock establishment icon 1000 in step 610, steps of a lock, ing operation that door lock is latched are performed as shown in Fig. 4c. On clicking a lock establishment icon 1000 from main server100 to user's PC is transferred lock establishment page fi-le in step 1010, wherein a subscriber's information page and user's security number page is superposed on the transferred lock establishment page. After typing one's ID and password into a subscriber's information page and first and second security numbers into the user's security number page in the transferred lock establishment page, a subscriber clicks a submit icon in step 1020. The written out lock establishment page file is trans-ferred to main server 100. Main server 100 searches a stored ID and password within user's information list file of user's information administration file server and compares the transferred ID, password. and first and second security numbers with the searched ID, password, and first and second security numbers in step 1030. If identified, main serverlOO supplies an executive set-up data to a subscribed electronic lock device 320 based on the transferred ID, sirmultaneousty with providing a message file to user's PC in step 1040, wherein a content of message contains''lock is latching.". Accordingly, the subscribed etectronic lock device 320 performs a lock operation by an excusive set-up data in step 1050 that is. Iatches door lock depending on an executive set--up data in step 1050. On completion of a lock establishment operation main server 100 transmittes another message file to user's PC, wherein a content of the another message is"lock had latched.". Step 1060 teaches that main serverlOO provides an error message file to user's PC if not identified in step 1030.

Fig. 4d shows a flow chart for explaining steps of foreigner's identification operation in a security system in case that foreigner as caller depresses down call switch SW2 of door phone device 310 when a foreigner visits a subscriber's home.

As shown in Fig.4d, a subscriber clicks a foreigner's identification icon 1100 in step 610 when a foreigner calls him at his door. An operation of an outdoor mode establishment would like to be explained before the subscriber performs the foreigner's identification operation. From main server 100 to user's PC in step 1110 is transferred the foreigner's identification page file when the subscriber clicks the foreigner's identification icon 1100. In the foreigner's identification page a subscriber's information page, an outdoor mode fixation icon. an outdoor mode break icon, a next icon, and a submit icon are constituted, if a subscriber would like to establish ap outdoor mocie, he continues to click an outdoor mode fixation icon and a submit icon after typ-ing his ID and password in-to the transferred subscriber's information page in step 1111. Resulting from receiving the typed foreigner's identification page file and an outdoor mode fixation icon and a submit icon signals, main server 100 comes to confirm the fact that establishment of an outdoor mode had been completed at a predetermined group network based on ID of the received subscriber's information page in step 1112. After a lapse of a predetermined time, a foreigner calls a subscriber utilizing call switch SW2 of subscriber's door phone device 310 of external door equipment 200, and then the fact that a foreigner is at his door is transmitted to the subscriber by a paging operation of main server 100. Namely, main server 100 discriminates whether a call signal is generated from which of group network in a plural of subscriber's group networks A. B, C, D... n in step 1120 so that it may determine whether an outdoor mode is set up at the discriminated group network in step 1121, and successively searches a contact catt number within a user's information list file from a predetermined memory part of user's information administration file server. After a contact of such fact, the subscriber clicks a foreigner's identification icon 1100.

From main server 100 to user's PC is transferred a foreigner's identification page file on which a appeared outdoor mode fixation icon, next icon, and submit icon after typing his ID and password into the transferred subscriber's information page are continuously clicked by the subscriber. Main server 100 determines whether outdoor mode fixation icon, next icon. and submit icon signals are consecutively input in step 1130. On consecutive receipt of these signals main server 100 forces to read out a stored foreigner's image within its predetermined memory part (not shown) and provides to the subscriber the read out stored foreigner's image as a file. The stored foreigner's image which is derived from as a raw data a sense signal taken from second sensing unit 330 of the discriminated group network is signal-processed in main server 100 for the purpose of providing a processed data to the subscriber is within a predetermined memory part (not shown) in step 1123. Therefore, the subscriber can identify a foreigner who was a caller, as the provided foreigner's image in step 1140. Only the case of the above described foreigner's identification corresponds to a subscriber who is remotely from outer door. Let's us think that a subscriber is within inter door this time.

A subscriber clicks a foreigner's identification icon 1100 a foreigner calls him at his door, depressing down call switch SW2 of a door phone device 310. From main server 100 to user's PC in step 1110 is transferred a foreigner's identification page file. The subscriber continues to click a next icon and a submit icon after typing his lD and password into the transferred subscriber's information page on a t6 foreigner's identification page. Accordingly, the foreigner's identif- ification page is entered with next icon and submit icon signal into main server 100 which takes as a raw data a sense signal from second sensing unit 330 and makes signal processing before a finish of a temporary storage work within a predetermined memory part (not shown), for the purpose of providing a stored foreigner's image data as a file to user's PC in step 1140. Step 1150 teaches that a subscriber continues to click an outdoor mode break icon and a submit icon if he would-like to release. The same operation than the above described operation is repeatedly fulfilled. hereinafter.

Referring to Fig. 4e which shows a flow chart for explaining steps of a door lock release operation, main server 100 supplies a lock release page file to user's PC when a subscriber clicks a lock break icon 1200 in step 1210. A subscriber's information page and user's security number page are loaded on the lock release page filled up by the subscriber with seeing screen of his PC. I f the subscriber clicks a submit icon in step 1220 after completion of filling up, the filled up lock release page file is transferred to main serverlOO. Step 1230 says that main server 100 makes a search work about a stored subscriber's information and user's security numbers within a user's information!istfi!e from a predetermined memory part of user's information administration file server so as to compare the transferred subscriber's information and user's security number with a corresponding searched subscriber's information and user's security number, if identified, main server 100 supplies an executive break data to a correspanding electronic lock device 320 on basis of ID of the transferred subscriber's information, simultaneously with providing to user's PC a fife loaded on a message which of a content in "look is loosing."in step 1240. Consequently, the corresponding electronic lock device 320 makes door lock unlatched in response to an executive break data in step 1250. Upon finish of release work. a file loaded on a message which of a content is"lock had been unlatched." is transmitted from main server 100 to user's PC. If not identified in step 1030. main server 100 generates an error message and transmittes it to user's PC in step-1260.

Referring to Fig. 41. main server 100 judges whether a subscriber's information page. file is one time or more output to user's PC in step 1310 when a subscriber cticks lock contro ! icon 1300 out of various item selection icons in step 610 of Fig. 3. In case of no generation even one time in the subscriber's information page file, main server 100 provides to user's PC a lock state checking page file in step 1310. A subscriber's information page and user's security number page are in the lock state checking page. A subscriber clicks submit icon in step 1320 after filling up a lock state checking page through user's PC the filled up a lock state checking page file is provided to main server 100. Main server 100 searches stored subscriber's information and user's security numbers within user's information list file from a memory part of user's information administration file server so as to compare the provided subscriber's information and user's security number of the lock state checking page with a corresponding searched subscriber's information and user's security number in step 1330. In case that a subscriber's information is output one time or more in step 1310, or if identified in step 1330, a file loaded on a message which of a content is "lock was latched."or"lock was unlatched" is supplied from main server 100 to user's PC in response to a sensing signal on receipt of it from first sensing unit 240 based on ID of the provided subscriber's information in step 1340. If not identified in step 1330 an error message is transmitted from main server 100 to user's PC in step 1350.

Fig. 4g shows steps of a safeguard service in a security system according to an embodiment of the present invention.

Referring to Fig.4g, main server 100 provides a safeguard service page the to user's PC. in step 1410 when a subscriber clicks a safeguard service icon 1400 out of diverse item selection icons in step 610. The safeguard service page includes subscriber's information page. user's'security number page, safeguard service establishment icon, safeguard service release icon, seeing icon, and submit icon. A subscriber continues to click a safeguard service establishment icon and a submit icon after filing up safeguard service page through his PC in step 1420. With a clicking operation of the safeguard service establishment icon by the subscriber the filled up a safeguard service page file is transferred to main server 100. Accordingly, main server 100 searches, on receipt of the transferred safeguard service page file, stored subscriber's information and user's security numbers within user's information list file from a memory part of user's information administration file server and compares the transferred subscriber's information and user's security number with a corresponding searched subscriber's information and user's security number in step 1430. If identified, main server 100 continues to watch over sensing device 300 of peripheral external equipment 10 based on ID of the transferred subscriber's information in step 1440. When an abnormal signal is generated from the sensing device 300 during keeping a lookout, main server 100 provides an alarm signal to a subscriber through a paging operation and takes an appropriate measures in step 1450. Moreover, if sensing device 300 is an image input device main server 100 controls sensing device 300 so as to take a foreigner's picture. Successively, main server 100 continues to store the taken foreigner's picture into a predetermined memory part (not shown), as image file. At this time when a subscriber may click continuously seeing icon and submit icon in step 1420 main server 100 read out the stored image file of foreigner's picture from the predetermined memory part and transmittes it to user's PC in step 1460. Consequently, a subscriber can see the transmitted foreigner's image via user's PC. A establishment of safeguard service is released in step 1470 in case that safeguard service release icon and submit icon are successively clicked in step 1420.

Fig. 4h shows a flow chart for explaining steps of providing priority order service on a special user's information out of one's family information.

Referring to 4h, a priority order service page file is transferred from main server 100 to user's PC in step 1510 when a subscriber clicks priority order service icon 1500 in step 610. This priority order service page has a subscriber's information space, an user's security number space, an user's information space for a priority order service. A subscriber writes out the priority order service page via user's PC and clicks a submit icon in step 1520 so that the written out a priority order service page file may be transferred from user's PC to main server 100. Further, main server 100 receives a priority order service page file and discriminates whether arty group network is for a priority order service on basis of ID in the subscriber's information space of the priority order service page. Main server 100 recognizes that a priority order service is set up to a predetermined group network in step 1530. Every time when subscriber's information is entered into main server 100 it judges whether the entered subscriber's information belongs to a group network for a priority order service in step 1540. When user's information other than user's information loaded on priority order service page 100 is. If belonged, entered into main server 100 it ignores the entered user's information and generates an error message in step 1550.

Fi.5 shows a manufacturing process of a conversion device 500 according to an embodiment of the invention, which is adhesive to any place of a door.

In Fi.5, a conversion device 500 which senses a fine change of an atmospheric pressure which may go from a static pressure to a dynamic pressure. The conversion device 500 includes substrate 1 which consists of a semiconductor wafer having a silicon and a high mo ! ecu) ar composite resin as follows. The composite resin is one of polyester, potycarbonate, polyarcrylate, polystyrene, cellulose acetate, polyacrylrolytlyle styrene, polyethylene benzene, and like.

The polyester is preferably one of polyethylene terephthalate, and the polyarcrylate is one of polymethyl methacrylate, and hydrocymethacryl- ate. A predetermined metal material is deposited on the substrate 1 to a predetermined thickness so that first metal layer 2 may be formed on substrate 1. As a material of the deposited layer to be a formation of first metal layer 2 on substrate 1 is preferably one of a copper, a gotd. sitvef. and an a ! uminum. First insulation ! ayer 3 is formed on first metal layer 2 by deposition of a predetermined insulation material on first metal layer 2 as shown in Fig. 5a. Fist insulation layer 3 consists of a materiat having a low dieiectric constant.

Moreover, the material of first insulation layer 3 is characteristic in a high molecular properties, and is preferably one of a polypropylene, a polyurenthane. a polyamide, a polyethylene, a polyvinyl chloride. First photosensitive material is coated with to a predetermined thickness on first insulation layer 3 so that first photo resist layer 4 may be formed. After formation of first photo resist layer 4, it is exposed and developed by illumination of light so as to form a predetermined pattern as shown in Fig. 5b. Formation of the predetermined pattern in first photo resist layer 4 is successively connected to that the same insulation material as that of first insulation layer 3 is deposited on first insulation layer 3 and first photo resist layer 4 to a predetermined thickness. The deposition on first insulation layer 3 and first photo resist layer 4 results in formation of second insulation layer 5. Here, thickness of second insulation layer 5 is preferably thicker than that of first photo resist layer 4. A metallic oxide having a high dielectric constant is deposited over second insulation layer 5 to a predetermin- ed thickness so that third insulation layer 6 may be formed on second insulation layer 5. Thickness of third insulation layer 6 is substantially similar to the most thinnest thickness of second insulation layer 5. The metallic oxide is preferably one of Rocell salt KNaC4H406.4H2Q, titanium oxided barium BaTiO3, titanium oxided lead PbTi03, tianium oxided calcium CaTiO3, liob oxided lithium LiNbO3, and phosphoric acid potassium KHnPO4. The formed patterns on substrate 1 is dipped into a solution material. Both end parts in the predetermined pattern of first photo resist layer 4 is removed by a solution material, and then a hol low hole which acts as an air layer 4'is made between first and second insulation layers 3 and 5 at the central part of the predetermined pattern. The formed patterns on substrate 1 is also rinsed out of with a predetermined cleaning solution. A conductive material is deposited on first and third insulation layers 3 and 6 for the purpose of forming second metal layer 7 which functions as first electrode as shown in Fig. Sc.

Successively, thickness of second metal layer 7 is substantially similar to that of third insulation layer 6. After depositing, the same material as that of second and third insulation layers 5 and 6 is deposited to a considerably thin thickness over second metal layer 7 so that forth insulation layer 8 may be formed. Continuously, second photosensitive material is coated over forth insulation layer 8 so that photo resist laminate 9 may be formed as shown in Fig. 5d. At this time, thickness of photo resist laminate 9 must be considerably thicker than the sum thickness of second, third, and forth insulation layers 5, 6, and 8 and second metal layer 7. A rate of the sum thickness and a width of air layer 4'is preferably 60: 5 to 80: 5.

Photo resist laminate 9 is exposed and developed by illumination of light so that a predetermined pattern may be formed. The same material as that of first and second insulation layers 2 and 5 iscovered on patterned photo resist laminate 9 and forth insulation layer 8 so that fifth insulation layer 10 may be formed. Thickness of fifth insulation layer 10 must be thimier than that of the formed predetermined pattern of Fig. 5e on air layer 4'. Patterned photo resist laminate 9 is gotten rid of by a solution material, and then the formed patterned on substrate 1 is dipped into a predetermined cleansing solution so as to ciean it. Accordingly, a dielectric material having a predetermined shaped pattern is formed after rinsing as shown in Fig 5f. The shape of the dielectric material is preferably a H shaped material over which the same photosensitive material as first photosensitive material is coated so that third photo resist layer 11 may be formed through exposure and development by illumination of light.

Accordingly, third photo resist layer 11 is patterned. A conductive material is deposited over third photo resist layer 11 to a considerably thin thickness for the purpose of forming third metal layer 12 as shown in Fig. 5g. Third meta ! layer 12 functions as electric wiring. Forth photosensitive material having a different photosensitivity characteristic from that of first and second photosensitive materials is again coated over third metal layer 12 so as to form forth photo resist layer 13 of which a predetermined patterns results from exposure and development by illumination of light. Fifth photosensitive material is coated over th-ird metai layer 12. Then, fifth photosensitive material is exposed and developed so that a predetermined pattern which is fifth photo resist layer 13 is formed partially on both ends of a pair of projections 10'and 10"of third metal layer 12. On third metal layer 12 between both projection portions 10'and 10"of the H shaped dielectric material 10 is deposited to a predetermined thickness the same material as that of third meta ! ! ayer t2 for the purpose of forming forth metal layer 13 which acts as second electrode. Also, third and forth metal layers 12 and 14 is etched so as to form a plural of air path holes into which air can be input. Forth and fifth photo resist layers 11 and 13 are removed selectively by a corresponding solution material. The formed patterns on substrate 1 are rinsed by a cleaning solution. Further, substrate 1 is back-etched so that metallic contact hole 16 may be formed. The same conductive material as that of first metal layer 2 is fille up into metallic contact hole 16 and covered over the bottom portion of substrate 1 so that f if th metal layer 15 may be formed as shown in Fig. 5h. Accordingly, first and fifth metal layers 1 and 15 is connected metallically to each other. A predetermined bias voltage is applied across second and third electrodes. By first voltage change incurred at between first metal layer 2 and second meta ! ! ayer 7 and second voltage change incurred at between second metal layer 7 and forth metal layer 14 are sensed a fine change of an atmospheric pressure in a coversion device 500. Further, an electrostatic capacitance resulted from second voltage change is substantially similar to that of across the biased electrodes. Resultingly, a fine change of an atmospheric pressure can be measured by comparison of these voltages. There is a conversion device 500 according the present invention constituted by having structures in which a displacement of a dielectric material depending on change of an atmospheric pressure can be measured as a voltage in response on a change of an electrostatic capacitance so that a fine change of an atmospheric pressure could be sensed. Therefore, the sensed fine change of an atmospheric pressure indicates that environment conditions of a subscriber's door is changed or foreigner's illegal invasion is made in a door. Moreover, a conversion device 500 according the present invention can be utilized as a microphone in which a sonic pressure can be changed into an electrical signal. Specially, a conversion device 500 may be utilized as a condenser. Structures for a condenser is a configuration in that each the above iayers has an alternative thickness, in particular thickness of air layer 4'is thinner than that of third insulation layer 6 on it and thickness of forth insulation layer 8 is considerably thicker. Also, second metal layer 7 may not exist in such structures. Formation of a plural of air path holes is not necessary.

As above described according to the present invention although only a preferred embodiment of a security system is in detail explained even in a described specification, it is clear, for a skilled who is in field of techniques pertaining to the present invention, that it is possible to apply various modifications or/and corrections to the preferred embodiment of a security system within a range of a technical scope of the described specification, and it is natural that such modifications or/and corrections belong to a scope of an attached claims.