Con esta herramienta te facilitamos un acceso a todas las ofertas y demandas de tecnología europeas y a búsquedas de socios para participar en propuestas europeas de I+D publicadas en la red Enterprise Europe Network, pudiendo filtrar los resultados para facilitar las búsquedas más acordes con tus necesidades.

¿Quieres recibir estos listados de oportunidades de colaboración en tu correo de forma periódica y personalizada? Date de alta en nuestro Boletín

Los términos de búsqueda han de ser en inglés.

Solución de vigilancia en tiempo real para protección y seguridad en infraestructuras, gestión fronteriza y lucha contra el crimen


Oferta Tecnológica
Una empresa española del sector de las TIC ha desarrollado una solución de vigilancia en tiempo real para protección y seguridad en infraestructuras, gestión fronteriza y lucha contra el crimen. Esta solución se emplea para monitorizar, identificar y alertar sobre individuos, vehículos y objetos en lista blanca y lista negra. La solución realiza tareas de vigilancia mediante tecnologías de transmisión de vídeo avanzadas para smartphones y cámaras IP, incluyendo funcionalidades de aprendizaje profundo. La empresa busca integradores y desarrolladores de TIC con el fin de establecer acuerdos comerciales con asistencia técnica y cooperación técnica para implementar, adaptar y continuar con el desarrollo de la tecnología.


Real-time surveillance solution for protection and security in infrastructures, border management and fight against crime
A Spanish ICT company, has developed a real-time surveillance solution for protection and security in infrastructures, border management and fight against crime. It focuses on monitoring, identifying and alerting about whitelisted or blacklisted individuals, vehicles, objects. The company is looking for ICT integrators and developers for commercial agreements with technical assistance and technology cooperation for implementation, customisation and further development.
The technology developed by the Spanish company addresses the growing worldwide concern about security, regarding crimes and attacks. It performs surveillance tasks through cutting-edge video-streaming technologies for standard smartphones and IP cameras, including video deep learning features. Therefore, it is suitable to detect potential threats, helping LAU (Law Enforcement Units) to perform the monitoring of crimes suspects and private security operators (in the case of critical infrastructures) to identify unauthorized individuals.

The solution is based on the following technologies:
-State-of-the-art mobile devices and smartphones for sending video captured over mobile broadband networks (WiFioredes4G).
- Mathematical algorithms [Deep Machine Learning] of video search of previously defined patterns (faces or objects) or anomalous behaviours not expected.
-Cloud computing platform for processing video streaming, storage and video distribution.
- Customized web for system configuration and information visualization.

Main characteristics:
-Deep machine learning:
· Face recognition: Black and white lists.
· Object recognition: Weapons, abandoned objects, etc.
· Scene recognition: Detailed scene description.

-Recognition filters:
· Allows the configuration of logical recognition alarms per video channel
· Semantic video search of: Weapons, car plates, objects, people.

· Sending smartphone sensor metadata: Accelerometer, GPS, Iris scanner, fingerprint, heart rate,...
· Alarms: Man-down, struggling, in race, geo-fending...

·Unattended reconnaissance and alarm analysis. First alarm filter before human.
· Sending sound/textual alerts to field agents (smartphone) and the alarm center.

Another important functionalities are the following:
-Allows real-time communications between control center (CC) and field agents (AC). The ACs communicate with the CC through smartphones (SP). The SP sends video, audio and sensor metadata to the surveillance platform.
-Agent location in a map: GPS positioning, route followed, current speed.
-Early warning: Fallen agent, struggling agent, agent running, agent out of area established (alarm by geo-fencing).
-Storage metadata browser: It tags and storages videos and recorded metadata for later use allowing Immediate search of information based on alarms and recognitions and get to the point of a video in which an event occurred.

The company is looking for ICT integrators willing to cooperate under commercial agreement with technical assistance.
In addition, the company is willing to cooperate with partners interested in technical cooperation agreement.

Advantages and Innovations:
Thanks to the technology used to send video in real time from a mobile terminal or IP camera and algorithms for recognition of patterns and behaviors for artificial vision, it is possible to detect , ,what the human eye could obviate. Therefore, without this technology any distraction or loss of concentration of a security agent could lead to a crime not being detected.
Everything can be monitored and controlled by the authority in charge so if for example somebody takes out a gun at a demonstration, a robbery is happening or a person in search and capture is detected it raises the alarm and mobilizes the most suitable resources for each event.
Stage of Development:
Already on the market
Secret Know-how

Partner sought

Type and Role of Partner Sought:
The company is looking for two kind of possible partners:
-International ICT integrators with contacts and knowledge within the security sector, willing to cooperate under commercial agreement with technical assistance.

-Companies or organizations with complementary technologies or capabilities, willing to cooperate under technical cooperation agreement in order to improve the technology through further development.


Type and Size of Client:
Industry SME 11-49
Already Engaged in Trans-National Cooperation:
Languages Spoken:


Technology Keywords:
01003006 Computer Software
02009022 Sistemas de seguridad