CN111784987B - Intelligent security alarm system - Google Patents

Intelligent security alarm system Download PDF

Info

Publication number
CN111784987B
CN111784987B CN202010671395.3A CN202010671395A CN111784987B CN 111784987 B CN111784987 B CN 111784987B CN 202010671395 A CN202010671395 A CN 202010671395A CN 111784987 B CN111784987 B CN 111784987B
Authority
CN
China
Prior art keywords
security
data
node
protection
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010671395.3A
Other languages
Chinese (zh)
Other versions
CN111784987A (en
Inventor
蒲雪芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Expo creative digital technology (Shenzhen) Co.,Ltd.
Original Assignee
Shenzhen Zhile Future Robot Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhile Future Robot Technology Co ltd filed Critical Shenzhen Zhile Future Robot Technology Co ltd
Priority to CN202010671395.3A priority Critical patent/CN111784987B/en
Publication of CN111784987A publication Critical patent/CN111784987A/en
Application granted granted Critical
Publication of CN111784987B publication Critical patent/CN111784987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the field of big data and intelligent security, and discloses an intelligent security alarm system which comprises a security intelligent alarm platform and security nodes; the security intelligent alarm platform comprises a data acquisition module, a security identification module, a security authentication module, a security alarm module and a database; the data acquisition module acquires a first security data domain of a first security node; the security and protection identification module analyzes whether a first trigger event occurs according to the first identification data; the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data; the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data; and the security alarm module sends the protection alarm instruction to the corresponding security node according to the security protection area list. The invention realizes intelligent alarm and peripheral security node cooperative alarm through the security intelligent alarm platform.

Description

Intelligent security alarm system
Technical Field
The invention relates to the field of big data and intelligent security, in particular to an intelligent security alarm system.
Background
The intelligent security is based on technologies such as Internet of things, big data and cloud computing, and people's air defense, physical defense and technical defense are closely combined to form a set of complete security system. The system can be divided into: video monitoring, anti-theft alarm, intelligent analysis, building talkback, access control and the like, thereby effectively ensuring the daily life of people such as work, study, entertainment, traffic and the like.
However, the traditional security system has the disadvantages that the acquisition of alarm information is single, data acquired by various sensors are not fused, and the alarm information obtained by the single sensor cannot accurately identify the information of an intruder, so that false alarm or false alarm of the system is caused; in addition, only the video monitoring consisting of a single camera is used, and the monitoring mode needs a large amount of manpower to carry out monitoring all the day, so that the labor cost is not saved.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an intelligent security alarm system which comprises an intelligent security alarm platform and security nodes, wherein the intelligent security alarm platform is in communication connection with the security nodes;
the security protection intelligent alarm platform comprises a data acquisition module, a security protection identification module, a security protection authentication module, a security protection alarm module and a database, wherein the modules are in communication connection;
the data acquisition module acquires a first security data domain of a first security node and stores the first security data domain in a database; the first security data field comprises first authentication data and first protection zone data;
the security identification module analyzes whether a first trigger event occurs according to the first identification data, and acquires a second security data field of a second security node according to the first protection area data when the first trigger event occurs, wherein the second security data field comprises second identification data and second protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data;
the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data, and analyzes a protection warning level according to the security authentication data;
the security authentication module obtains a security protection area list according to the first protection area data;
the security alarm module sends a protection alarm instruction to a corresponding security node according to the security protection area list;
and the security node responds to the received protection alarm instruction to execute security alarm operation.
According to a preferred embodiment, the security node comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera and a web camera.
According to a preferred embodiment, the security authentication module analyzing whether the first trigger event occurs according to the first authentication data includes:
the security identification module obtains first state characteristic data according to the first identification data;
the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first trigger event occurs or not;
the state change degree is used for measuring the change degree of the environment in a target monitoring area of the security node;
when the first state change degree is larger than a first state threshold value, a first trigger event is generated, and a security identification module acquires a second security data domain according to the first protection area data;
when the first state change degree is smaller than the first state threshold value, the first triggering event does not occur, and the security protection intelligent alarm platform deletes the first security protection data domain.
According to a preferred embodiment, the first security data domain is a security data domain of a first security node, the second security data domain is a security data domain of a second security node, and the security data domain is used for performing security state detection and event analysis on the security nodes.
According to a preferred embodiment, the first guard area data is used for identifying all security nodes in a guard area where the first security node is located, and the first guard area data comprises a node identifier of the first security node and a node identifier of the second security node;
the first security node is a target security node; the second security protection node is the other security protection nodes except the first security protection node in the protection area where the first security protection node is located.
According to a preferred embodiment, the step of acquiring the second security data domain by the security authentication module according to the first protection zone data comprises:
the security identification module acquires a node identifier of a second security node according to the first protection area data;
the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier;
and the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module.
According to a preferred embodiment, the updating, by the security authentication module, the first authentication data according to the second authentication data to obtain the security authentication data includes:
the security authentication module obtains a node identifier of a second security node according to the first protection area data and sends an updating request instruction to the second security node according to the node identifier;
the second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module;
and the security authentication module performs data fusion on the second identification data and the first identification data to obtain security authentication data.
According to a preferred embodiment, the rate of identification of the first trigger event is maximized to update the first state threshold:
maxR=(Gθ-Q)s.tα∈[x1,y1]β∈[x2,y2]
wherein R is the identification rate of the first trigger event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first trigger event, theta is the identification coefficient, Q is the false alarm rate of the first trigger event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
According to a preferred embodiment, the step of obtaining the security protection zone list according to the first protection zone data comprises the following steps:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data;
and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
According to a preferred embodiment, the security protection area list is used for storing node identifiers of security nodes in a security node protection area where a trigger event occurs, and the security protection area list includes a node identifier of a first security node where a first trigger event occurs and a node identifier of a second security node where a second trigger event occurs.
According to a preferred embodiment, the security authentication module obtains a protection warning level according to the security authentication data; and when the protection warning level is not serious warning, storing the security authentication data in a database for the owner to check.
The invention has the following beneficial effects:
when the current security protection node generates a trigger event, the security protection intelligent alarm platform can also judge whether a second security protection node in the protection area where the security protection intelligent alarm platform is located generates the trigger event, so that cooperative alarm among all security protection nodes in the protection area is realized, the alarm result is accurate, and the security alert degree of the whole protection area is improved.
When a triggering event occurs, the security and protection intelligent alarm platform analyzes the protection alarm level, judges whether to alarm or not according to the protection alarm level, and automatically identifies certain unnecessary alarms so as to achieve intelligent alarm and reduce the consumption of human and material resources caused by false alarm.
Drawings
Fig. 1 is a block diagram of an intelligent security alarm system according to an exemplary embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, in one embodiment, an intelligent security alarm system may include: the system comprises a security intelligent alarm platform and security nodes, wherein the security intelligent alarm platform is in communication connection with the security nodes;
the security protection intelligent alarm platform comprises a data acquisition module, a security protection identification module, a security protection authentication module, a security protection alarm module and a database, wherein the modules are in communication connection.
The data acquisition module acquires a first security data domain of a first security node and stores the first security data domain in a database; the first security data field comprises first authentication data and first protection zone data;
the security identification module analyzes whether a first trigger event occurs according to the first identification data, and acquires a second security data field of a second security node according to the first protection area data when the first trigger event occurs, wherein the second security data field comprises second identification data and second protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data;
the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data, and analyzes a protection warning level according to the security authentication data;
the security authentication module obtains a security protection area list according to the first protection area data;
the security alarm module sends a protection alarm instruction to a corresponding security node according to the security protection area list;
and the security node responds to the received protection alarm instruction to execute security alarm operation.
The security node comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
Specifically, in an embodiment, the security alarm method executed by the intelligent security alarm system may include:
s1, the data acquisition module of the security protection intelligent alarm platform acquires a first security protection data domain of the first security protection node and stores the first security protection data domain in the database. The first security data domain is a security data domain of the first security node, and the first security data domain comprises first identification data and first protection area data.
Specifically, the security data domain is used for carrying out security state detection and event analysis on the security nodes; the first identification data comprises video stream data and sensing data. The first protection zone data is used for identifying all security nodes in a protection zone where the first security node is located, and the first protection zone data comprises a node identifier of the first security node and a node identifier of the second security node.
The first security node is a target security node, and the second security node is other security nodes except the first security node in a protection area where the first security node is located.
The video stream data is obtained by compressing and coding original video image data collected in a target monitoring area by a security node through a video compression technology.
Optionally, the security node is a device for checking the security state of a target monitoring area in the protection area, and includes a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a spatial movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera, and a web camera.
Optionally, the protection area is an area with a comprehensive precaution function, and the protection area is composed of one or more security nodes, where the security nodes may include one or more types.
S2, the security authentication module analyzes whether the first security node generates the first trigger event according to the first authentication data.
Specifically, the process that the security authentication module analyzes whether the first security node generates the first trigger event according to the first authentication data includes:
the security identification module obtains first state characteristic data according to the first identification data; the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value. The state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
Specifically, the feature extraction unit of the security identification module obtains a first state feature vector according to the first state feature data,
A=[a1,a2…an]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the security identification module calculates a first state change degree according to the first state feature vector and the standard state feature vector,
Figure BDA0002582429780000071
where n is the number of state features, i is the state feature index, c is the first state change degree, aiFirst state value of i-th state feature, biIs the standard state value of the ith state feature.
When the first state change degree is larger than a first state threshold value, a first trigger event is generated, and the security identification module acquires a second security data domain according to the first protection area data.
When the first state change degree is smaller than the first state threshold value, the first triggering event does not occur, and the security protection intelligent alarm platform deletes the first security protection data domain.
Optionally, the first state threshold is a critical value preset by an administrator to determine that the first trigger event occurs, and the first state change degree is used to measure the environmental similarity. The standard state characteristic data is data which is pre-configured by an administrator according to the equipment parameters of the security node in the normal state in the target monitoring area.
Optionally, the first trigger event is a change of an environment occurring in a target monitoring area of the first security node.
S3, when the first trigger event occurs, the security identification module obtains a second security data domain of the second security node according to the first protection area data.
Specifically, the process that the security identification module obtains the second security data domain according to the first protection area data comprises the following steps: the security identification module acquires a node identifier of a second security node according to the first protection area data; the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier; and the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module.
S4, the security protection identification module analyzes whether a second trigger event occurs according to second identification data, and the second security protection data field comprises second identification data and second protection area data.
Specifically, the process of analyzing whether the second trigger event occurs according to the second identification data by the security identification module includes: the security and protection identification module obtains second state characteristic data according to the second identification data; the security identification module acquires standard state characteristic data from the database; and the security and protection identification module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value.
Specifically, the feature extraction unit of the security identification module obtains a second state feature vector according to the second state feature data,
D=[d1,d2…dn]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
the state change degree calculation unit of the security identification module calculates a second state change degree according to the second state feature vector and the standard state feature vector,
Figure BDA0002582429780000081
where n is the number of state features, i is the state feature index, t is the second state change degree, diSecond state value of i-th state feature, biIs the standard state value of the ith state feature.
When the second state change degree is smaller than the second state threshold value, the second triggering event is generated, the security authentication module updates the first identification data according to the second identification data to obtain security authentication data, and when the second state change degree is larger than the second state threshold value, the second triggering event is not generated.
Optionally, the security identification module analyzes and judges whether at least one second security node has a second trigger event according to second identification data in the second security data domain, and when none of the second security nodes has the second trigger event, the security identification module obtains a node identifier of the second security node according to the first protection area data, and sends security warning information to the second security node according to the node identifier.
Optionally, the second trigger event is a change of an environment in a target monitoring area of the second security node. The safety warning information is used for informing a second security protection node in the protection area where the first security protection node is located to improve the safety warning degree and strengthen the monitoring degree.
And S5, when a second trigger event occurs, the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data.
Specifically, the process of updating the first identification data by the security authentication module according to the second identification data to obtain the security authentication data includes:
the security authentication module obtains a node identifier of a second security node according to the first protection area data of the first security data domain, and the security authentication module sends an update request instruction to the second security node according to the node identifier.
The second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module; and the security authentication module performs data fusion processing on the second identification data in the second security data domain and the first identification data to obtain security authentication data.
Optionally, the data fusion process includes: the security authentication module adds the node identifier of the first security node to video stream data and sensor data in the first authentication data according to the first security data domain; and the security authentication module adds the node identifier of the second security node to the video stream data and the sensor data in the second authentication data according to the second security data domain.
The security authentication module performs fusion processing on the video stream data added with the node identifier of the first security node and the video stream data added with the node identifier of the second security node to obtain first metadata; and the security authentication module performs fusion processing on the sensing data added with the node identifier of the first security node and the sensing data added with the node identifier of the second security node to obtain second metadata. And the security authentication module integrates the first metadata and the second metadata to obtain security authentication data.
S6, the security authentication module obtains a protection warning level according to the security authentication data, and the protection warning level comprises: no warning, ordinary warning and serious warning. And when the protection warning level is serious warning, obtaining a security protection area list according to the first protection area data and the second protection area data.
Specifically, the process of the security authentication module obtaining the protection warning level according to the security authentication data includes: the security authentication module obtains a dimension characteristic vector X ═ X according to the security authentication data1,x2,…,xn](ii) a The security authentication data acquires alarm standard data from the database, and acquires a first characteristic vector Y according to the alarm standard data1=[y1,y2,…,yn]Second feature vector Y2=[y1,y2,…,yn]And a third feature vector Y3=[y1,y2,…,yn]. Calculating a first matching degree M of the dimension feature vector and the first feature vector1Second degree of matching M of the dimensional feature vector with the second feature vector2Third degree of matching M of the dimensional feature vector and the third feature vector3. Wherein
Figure BDA0002582429780000091
Comparison M1,M2,M3The size of (2). If M is1At minimum, the protection alert level is no alert at this time, if M2At the minimum, the protection warning level is the ordinary warning at this moment, if M3At a minimum, the protection alert level is now a severe alert.
Specifically, the security authentication module obtains a protection warning level according to the security authentication data, and when the protection warning level is serious warning, the step of obtaining a security protection area list according to the first protection area data includes:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data; and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
The security protection area list is used for storing node identifiers of security protection nodes in a security protection node protection area where trigger events occur, and the node identifiers comprise a node identifier of a first security protection node where a first trigger event occurs and a node identifier of a second security protection node where a second trigger event occurs.
Optionally, when the protection warning level is a serious warning, it is indicated that the trigger event in the target monitoring area of the security node meets the alarm condition, and the security authentication module obtains a security protection area list according to the first protection area data.
Optionally, when the protection warning level is not a serious warning, the security authentication module stores the security authentication data in the database for the owner to check.
S7, the security alarm module sends the protection alarm instruction to the corresponding security node according to the security protection area list, and the security node responds to the received protection alarm instruction to execute security alarm operation.
When the current security protection node generates a trigger event, the security protection intelligent alarm platform can judge whether a second security protection node in a protection area where the security protection intelligent alarm platform is located generates the trigger event or not, so that the condition of false alarm is prevented, and safety alarm information is sent to the second security protection node which does not generate the trigger event, so that the second security protection node can improve the monitoring force on a target area after receiving the safety alarm information, and the safety is ensured.
When the current security node generates a trigger event, the security intelligent alarm platform can also judge whether a second security node in the protection area where the current security node is positioned generates the trigger event, so that the cooperative alarm among all security nodes in the protection area is realized, the alarm result is ensured to be accurate, and the security degree of the whole protection area is improved.
In addition, when a triggering event occurs, the security and protection intelligent alarm platform analyzes the protection alarm level, judges whether to alarm or not according to the protection alarm level, and automatically identifies certain unnecessary alarms so as to achieve intelligent alarm and reduce the consumption of human and material resources caused by false alarm.
In another embodiment, after the security alarm is completed, the security intelligent alarm platform updates the first state threshold and the second state threshold respectively according to the security alarm result to obtain a first updated threshold and a second updated threshold, and the first updated threshold and the second updated threshold are used as the first state threshold and the second state threshold of the next security alarm to improve the accuracy of the next security alarm.
Specifically, the recognition rate of the first trigger event is maximized, and the threshold value at this time is taken as a first update threshold value:
maxR=(Gθ-Q)s.tα∈[x1,y1]β∈[x2,y2]
wherein R is the identification rate of the first trigger event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first trigger event, theta is the identification coefficient, Q is the false alarm rate of the first trigger event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
The method of updating the second state threshold to obtain the second updated threshold is the same as the method described above.
In the embodiment, after the security alarm is completed each time, the security intelligent alarm platform updates the first state threshold and the second state threshold, so that the identification rate of the trigger event is improved in the next security alarm, the more the security alarm times are, the higher the accuracy rate of the security alarm is, and the situations of false alarm and alarm missing are avoided.
In another embodiment, the process of the security authentication module obtaining the protection alert level according to the security authentication data includes: the security authentication module obtains target characteristic data according to the security authentication data, and the security authentication module obtains the number of target types according to the target characteristic data and compares the number with a target type threshold value;
when the number of the target types is smaller than the target type threshold value, the security authentication module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is no warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is a common warning.
When the number of the target types is larger than the target type threshold value, the security authentication module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is ordinary warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is serious warning.
The security protection intelligent alarm platform analyzes the target of the target monitoring area of the security protection node, whether the target in the target monitoring area meets the alarm condition is judged according to the preset index of the monitoring demand party, when the alarm condition is met, the corresponding security protection node executes the alarm action, and the characteristic information of the target is stored under the condition that the alarm condition is not met so as to be automatically checked by an owner, so that intelligent alarm is achieved, the owner is prevented from frequently going to and between the alarm points under the condition that certain trigger events do not need to alarm, and the consumption of manpower and material resources is reduced.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. An intelligent security alarm system is characterized by comprising an intelligent security alarm platform and security nodes, wherein the intelligent security alarm platform comprises a data acquisition module, a security identification module, a security authentication module, a security alarm module and a database,
the method comprises the steps that a data acquisition module acquires a first security data field of a first security node and stores the first security data field in a database, wherein the first security data field comprises first identification data and first protection area data;
the security identification module analyzes whether a first trigger event occurs according to the first identification data, and acquires a second security data field of a second security node according to the first protection area data when the first trigger event occurs, wherein the second security data field comprises second identification data and second protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data;
when a second trigger event occurs, the security authentication module updates the first identification data according to the second identification data to obtain security authentication data, and analyzes the protection warning level according to the security authentication data; the security authentication module obtains a node identifier of a second security node according to the first protection area data and sends an updating request instruction to the second security node according to the node identifier; the second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module; the security authentication module performs data fusion on the second identification data and the first identification data to obtain security authentication data;
the security authentication module obtains a security protection area list according to the first protection area data;
and the security alarm module sends the protection alarm instruction to the corresponding security node according to the security protection area list, and the security node responds to the received protection alarm instruction to perform security alarm.
2. The system of claim 1, wherein the security node comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a spatial movement detector, a temperature sensing detector, an integrated camera, a high-speed dome camera, and a web camera.
3. The system of claim 2, wherein the security authentication module analyzing whether the first trigger event occurs based on the first authentication data comprises:
the security identification module obtains first state characteristic data according to the first identification data;
the security identification module acquires standard state characteristic data from the database;
the security identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first trigger event occurs.
4. The system of claim 3, wherein the rate of identification of the first trigger event is maximized to update the first state threshold:
max R=(Gθ-Q)s.t α∈[x1,y1]β∈[x2,y2]
wherein R is the identification rate of the first trigger event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first trigger event, theta is the identification coefficient, Q is the false alarm rate of the first trigger event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
5. The system of claim 4, wherein the first protected zone data is used to identify all security nodes within the protected zone in which the first security node is located, and includes a node identifier of the first security node and a node identifier of the second security node;
the first security node is a target security node; the second security protection node is the other security protection nodes except the first security protection node in the protection area where the first security protection node is located.
6. The system of claim 5, wherein the security identification module obtaining the second security data field from the first protected zone data comprises:
the security identification module acquires a node identifier of a second security node according to the first protection area data;
the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier;
and the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module.
7. The system of claim 6, wherein the step of obtaining the list of security zones from the first zone data comprises:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data;
and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
8. The system of claim 7, wherein the security protection zone list is configured to store node identifiers of security nodes within the security node protection zone where the trigger event occurs, and wherein the node identifiers comprise a node identifier of a first security node where a first trigger event occurs and a node identifier of a second security node where a second trigger event occurs.
9. The system of claim 8, wherein the first security data domain is a security data domain of a first security node, the second security data domain is a security data domain of a second security node, and the security data domain is used for security state detection and event analysis of the security nodes.
CN202010671395.3A 2020-07-13 2020-07-13 Intelligent security alarm system Active CN111784987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010671395.3A CN111784987B (en) 2020-07-13 2020-07-13 Intelligent security alarm system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010671395.3A CN111784987B (en) 2020-07-13 2020-07-13 Intelligent security alarm system

Publications (2)

Publication Number Publication Date
CN111784987A CN111784987A (en) 2020-10-16
CN111784987B true CN111784987B (en) 2021-03-23

Family

ID=72768929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010671395.3A Active CN111784987B (en) 2020-07-13 2020-07-13 Intelligent security alarm system

Country Status (1)

Country Link
CN (1) CN111784987B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1650334A (en) * 2002-02-25 2005-08-03 欧姆龙株式会社 State surveillance system and method for an object and the adjacent space, and a surveillance system for freight containers
CN1898707A (en) * 2003-11-18 2007-01-17 英特图形软件技术公司 Digital video surveillance
CN101388130A (en) * 2008-03-05 2009-03-18 中科院嘉兴中心微系统所分中心 Multi-grade stereo anti-intruding system, apparatus and implementing method based on wireless sensing net
CN102884559A (en) * 2010-01-08 2013-01-16 Utc消防和保安美国有限公司 Control system, security system and method of monitoring a location
JP5356118B2 (en) * 2009-06-03 2013-12-04 トヨタホーム株式会社 Crime prevention system
CN104809840A (en) * 2015-04-25 2015-07-29 无锡智感星际科技有限公司 Intrusion detection method and system based on multiple sensors
US9741220B2 (en) * 2013-03-13 2017-08-22 Orbital Atk, Inc. Multi spectral detection device including an acoustic array, a protection system, and related methods
CN109374116A (en) * 2018-12-07 2019-02-22 武汉理工光科股份有限公司 The excavation Activity recognition method of buried Fibre Optical Sensor vibration-detection system
CN109658648A (en) * 2019-01-17 2019-04-19 上海智溟科技有限公司 Monitoring method, device and the system of boundary defence
CN110992628A (en) * 2019-11-28 2020-04-10 山东电工电气集团有限公司 Cable tunnel anti-intrusion system based on intelligent video
CN111091696A (en) * 2018-10-23 2020-05-01 安讯士有限公司 Emergency notification system
CN111243214A (en) * 2020-01-19 2020-06-05 佛山科学技术学院 Industrial machine room fire monitoring system and method based on machine learning
CN111277952A (en) * 2020-01-17 2020-06-12 清研讯科(北京)科技有限公司 Electronic fence information processing method and system, positioning tag and mobile device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002023832A (en) * 2000-07-04 2002-01-25 Mitsubishi Electric Corp Monitor system and radiation monitor system and its intelligent sensor and automatic vending machine control system
US20090167529A1 (en) * 2007-12-27 2009-07-02 Avi Kashi Electronic fence using wireless mesh network

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1650334A (en) * 2002-02-25 2005-08-03 欧姆龙株式会社 State surveillance system and method for an object and the adjacent space, and a surveillance system for freight containers
CN1898707A (en) * 2003-11-18 2007-01-17 英特图形软件技术公司 Digital video surveillance
CN101388130A (en) * 2008-03-05 2009-03-18 中科院嘉兴中心微系统所分中心 Multi-grade stereo anti-intruding system, apparatus and implementing method based on wireless sensing net
JP5356118B2 (en) * 2009-06-03 2013-12-04 トヨタホーム株式会社 Crime prevention system
CN102884559A (en) * 2010-01-08 2013-01-16 Utc消防和保安美国有限公司 Control system, security system and method of monitoring a location
US9741220B2 (en) * 2013-03-13 2017-08-22 Orbital Atk, Inc. Multi spectral detection device including an acoustic array, a protection system, and related methods
CN104809840A (en) * 2015-04-25 2015-07-29 无锡智感星际科技有限公司 Intrusion detection method and system based on multiple sensors
CN111091696A (en) * 2018-10-23 2020-05-01 安讯士有限公司 Emergency notification system
CN109374116A (en) * 2018-12-07 2019-02-22 武汉理工光科股份有限公司 The excavation Activity recognition method of buried Fibre Optical Sensor vibration-detection system
CN109658648A (en) * 2019-01-17 2019-04-19 上海智溟科技有限公司 Monitoring method, device and the system of boundary defence
CN110992628A (en) * 2019-11-28 2020-04-10 山东电工电气集团有限公司 Cable tunnel anti-intrusion system based on intelligent video
CN111277952A (en) * 2020-01-17 2020-06-12 清研讯科(北京)科技有限公司 Electronic fence information processing method and system, positioning tag and mobile device
CN111243214A (en) * 2020-01-19 2020-06-05 佛山科学技术学院 Industrial machine room fire monitoring system and method based on machine learning

Also Published As

Publication number Publication date
CN111784987A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
JP4924607B2 (en) Suspicious behavior detection apparatus and method, program, and recording medium
US10997422B2 (en) Information processing apparatus, information processing method, and program
US20240054791A1 (en) Information processing apparatus, information processing method, and program
CN109788242B (en) Rescue system, rescue method and server used by rescue system
CN111862380B (en) Intelligent security inspection management method
US7295106B1 (en) Systems and methods for classifying objects within a monitored zone using multiple surveillance devices
CN113011833A (en) Safety management method and device for construction site, computer equipment and storage medium
CN111757069B (en) Monitoring anti-theft method and device based on intelligent doorbell
CN109040681A (en) Switchgear house intelligence O&M terminal based on video analysis
CN112132047A (en) Community patrol system based on computer vision
CN112132048A (en) Community patrol analysis method and system based on computer vision
CN110674753A (en) Theft early warning method, terminal device and storage medium
CN111784987B (en) Intelligent security alarm system
CN111784986B (en) Intelligent security alarm method based on big data
CN111968324A (en) Big data-based intelligent community security alarm system
CN112885013A (en) Monitoring and early warning method and device and readable storage medium
US20230114160A1 (en) Monitoring device, monitoring method, and recording medium
KR101041851B1 (en) Sensor network for estimating target size and method thereof
CN117830960A (en) Smart community-based risk identification method, device, equipment and medium
Penna et al. Stampede monitoring and alarm system using Viola-Jones algorithm
CN107707568B (en) Aircraft supervision method and device, storage medium and server
CN115116192A (en) Security protection monitored control system based on intelligent robot
WO2022136819A1 (en) A Method and Apparatus for Controlling Actions of a Monitoring System
CN115880634A (en) Vehicle monitoring method, apparatus and computer-readable storage medium
CN114519532A (en) Personnel state detection method based on machine vision and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210305

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen Zhile future robot technology Co.,Ltd.

Address before: 628000 Xuefeng Qiao Road 338, Lizhou District, Guangyuan, Sichuan

Applicant before: GUANGYUAN LIANGZHIHUI TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 518052 tower 1501, Shenzhen International Qianhai Yidu building, No. 99, Gangcheng street, Nanshan street, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong

Patentee after: Expo creative digital technology (Shenzhen) Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: Shenzhen Zhile future robot technology Co.,Ltd.