CN112466078B - Intelligent security system - Google Patents

Intelligent security system Download PDF

Info

Publication number
CN112466078B
CN112466078B CN202011193001.4A CN202011193001A CN112466078B CN 112466078 B CN112466078 B CN 112466078B CN 202011193001 A CN202011193001 A CN 202011193001A CN 112466078 B CN112466078 B CN 112466078B
Authority
CN
China
Prior art keywords
information
face
terminal
verification
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011193001.4A
Other languages
Chinese (zh)
Other versions
CN112466078A (en
Inventor
危光辉
李腾
杨睿
庞森
余洋
徐浩然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing College of Electronic Engineering
Original Assignee
Chongqing College of Electronic Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing College of Electronic Engineering filed Critical Chongqing College of Electronic Engineering
Priority to CN202011193001.4A priority Critical patent/CN112466078B/en
Publication of CN112466078A publication Critical patent/CN112466078A/en
Application granted granted Critical
Publication of CN112466078B publication Critical patent/CN112466078B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to the technical field of security systems, in particular to an intelligent security system which comprises a data acquisition terminal, a server and a reminding terminal, wherein the data acquisition terminal is used for acquiring image information of a security area, and the server is used for carrying out image identification on the image information to judge whether people invade; the server is also used for carrying out image recognition on the image information to generate the number of indoor personnel, generating an acousto-optic alarm signal when personnel invade and the number of indoor personnel is 0, generating a music alarm signal when personnel invade and the number of indoor personnel is not 0, and sending the acousto-optic alarm signal or the music alarm signal to the reminding terminal; the reminding terminal is used for sending out sound and light alarm when receiving the sound and light alarm signal and playing preset music information when receiving the music alarm signal. By adopting the scheme, the technical problem that the alarm cannot be carried out according to the number of personnel in the security area in the prior art can be solved.

Description

Intelligent security system
Technical Field
The invention relates to the technical field of security systems, in particular to an intelligent security system.
Background
The intelligent security system has different security functions according to different application scenes, for example, the household intelligent security system has abnormal detection and alarm of gas leakage and the like, and the intelligent security system of an enterprise has abnormal detection and alarm of personnel intrusion and the like. However, regardless of the application scene, most of the alarm modes adopt sound-light alarm, invaders are stimulated through the sound-light alarm to prompt the invaders to escape, or guardians or users are reminded through the sound-light alarm, so that property loss of enterprises or families is reduced.
However, the sound and light alarm is also used for reminding intruders that behaviors are discovered, so that the intruders can be irritated, and when workers exist in a house or a business, the intruders in an angry state are extremely easy to cause personal injury to the workers in the house.
Disclosure of Invention
The invention aims to provide an intelligent security system to solve the technical problem that in the prior art, an alarm cannot be given according to the number of people in a security area.
The present invention provides the following basic scheme:
the intelligent security system comprises a data acquisition terminal, a server and a reminding terminal, wherein the data acquisition terminal is used for acquiring image information of a security area, and the server is used for carrying out image identification on the image information to judge whether personnel invade; the server is also used for carrying out image recognition on the image information to generate the number of indoor personnel, generating an acousto-optic alarm signal when personnel invade and the number of indoor personnel is 0, generating a music alarm signal when personnel invade and the number of indoor personnel is not 0, and sending the acousto-optic alarm signal or the music alarm signal to the reminding terminal; the reminding terminal is used for sending out sound and light alarm when receiving the sound and light alarm signal and playing preset music information when receiving the music alarm signal.
The beneficial effects of the basic scheme are as follows: the security area refers to an area needing protection, when the scheme is applied to the home of a user, the security area is the home, and when the scheme is applied to the management of an enterprise, the security area can be a working area of the enterprise or a working area of a confidential department of the enterprise.
The data acquisition terminal is arranged to acquire image information of the security area, so that whether personnel invade the security area or not and whether users or enterprise working staff still exist in the security area or not can be judged conveniently.
The server is arranged to identify the image information so as to learn whether personnel invade illegally, judge whether to send out an alarm according to whether personnel invade illegally, and simultaneously learn whether users or enterprise working personnel exist in the security area, and judge which alarm is sent out according to the number of indoor personnel in the security area.
And reminding the setting of the terminal, and playing specific music information when a user or an enterprise worker exists in the security area. Because the intruder does not know the meaning of the music information, the irritated behavior can not occur, but the personnel in the security area are already reminded at the moment, so that the measures of evasion, alarm and the like can be taken in time, and the risk of personal injury to the personnel in the security area is reduced. Meanwhile, as the intruder is not irritated and no overstimulation occurs, the evasive time can be strived for the personnel in the security area.
The server is further used for sending the alarm information to the management terminal according to the contact way when generating the sound-light alarm signal, and sending the avoidance information to the management terminal according to the contact way when generating the music alarm signal.
Has the advantages that: when the scheme is applied to the home of the user, the management terminal is an intelligent terminal carried by the user, such as a mobile phone. When the scheme is applied to enterprises, the management terminal is an intelligent terminal or an intelligent system used by enterprise security departments. The server is arranged and used for sending different information to the user under different conditions so as to remind the user to take different measures. The avoiding information can be that people in the house break into the door illegally at present, people please move to a safe area in the house to avoid in order to ensure the personal safety of people, the door and the window are locked, and the alarm is given in time, so that the user in the house is reminded to pay attention to the personal safety.
The system further comprises an identity verification terminal and a user terminal, wherein the identity verification terminal is used for collecting face verification images of people who enter and exit; the server is used for carrying out face recognition according to the face verification image to generate a matching degree, recording face standard characteristics when the matching degree is smaller than or equal to a preset first matching threshold and larger than a preset second matching threshold, and generating authority information to be sent to the user terminal; the server is also used for receiving photo album face information containing faces, head portrait face information and shared face information fed back by the user terminal, and screening the first N faces with the largest occurrence frequency according to the photo album face information to generate first face information; detecting the head portrait face information, comparing the head portrait face information with the first face information when the head portrait face information has data, and generating a secondary verification image according to a matching item when the matching item exists; when no matching item exists or the head portrait face information is null data, screening the top M faces with the most occurrence times according to the shared face information to generate second face information, comparing the second face information with the first face information, and when a matching item exists, generating a secondary verification image according to the matching item; the server is also used for carrying out face recognition according to the secondary verification image and the face standard characteristics to generate a matching degree, when the matching degree is greater than a first matching threshold value, a secondary verification success signal is generated, and when all the matching degrees are less than or equal to the first matching threshold value, a secondary verification failure signal is generated.
Has the advantages that: the identity of the person who enters and exits still needs to be verified in the important security area in a special period, but the accuracy of face recognition is affected due to the fact that the person wears the mask. In the prior art, the mode that the personnel upload the images by themselves for verification is adopted, the identity is easily faked by other people, and the security of a security area cannot be guaranteed. And the identity authentication terminal is arranged to collect face authentication images of the people who enter and exit to carry out face authentication. Because personnel wear the gauze mask at this moment and carry out face verification, the degree of accuracy of its discernment can receive the influence, for guaranteeing identity recognition's accuracy and staff's normal business turn over, carry out the secondary verification to the personnel that the matching degree is less than or equal to first matching threshold value and is greater than the second matching threshold value in the face verification.
During secondary verification, under the condition of obtaining personnel authorization, transferring photo album face information containing faces, head portrait face information and shared face information in the user terminal, wherein the photo album face information is a photo locally stored in the user terminal and containing the faces, the head portrait face information is a head portrait containing the faces in an instant messaging APP installed in the user terminal, for example, a WeChat head portrait, and the shared face information is a photo shared in the instant messaging APP and containing the faces. The method comprises the steps of obtaining the face of a user corresponding to a user terminal, namely a secondary verification image, by matching photo album face information and head portrait face information locally stored in the user terminal or matching photo album face information and shared face information locally stored in the user terminal, and carrying out face verification again through the secondary verification image information. Because the secondary verification image is not uploaded by the personnel, the condition that the identity is falsely used in the prior art is avoided, and meanwhile, the secondary verification image is automatically matched and obtained without other operations of the personnel, so that the flow of identity verification is reduced.
Further, the server comprises a feature extraction module and a feature comparison module, wherein the feature extraction module is used for extracting face verification features according to the face verification image and sending the face verification features to the feature comparison module; the characteristic comparison module is used for comparing the human face verification characteristics with preset human face standard characteristics one by one to generate matching degree.
Has the advantages that: the feature extraction module is arranged for extracting the face verification features according to the face verification image and comparing the face verification features with the preset face standard features to generate the matching degree.
Further, the server is also used for generating a face verification success signal when the matching degree is greater than the first matching threshold, and generating a face verification failure signal when all the matching degrees are less than or equal to the second matching threshold.
Has the advantages that: when the matching degree is greater than the first matching threshold, the matching degree representing the face recognition of the person under the condition of wearing the mask is still high, and therefore the person is determined to pass the face verification. Conversely, when all the matching degrees are less than or equal to the second matching threshold, the matching degree representing the face recognition of the person wearing the mask is very low, and thus the face verification is considered to fail. And for the condition that the matching degree is too high or too low, secondary verification is not needed, and the verification time of identity verification is shortened.
Further, the user terminal is used for receiving the authority information, and the authority information comprises an authority granting inquiry and an IP address of the server; the user terminal is also used for displaying the authority granting inquiry and acquiring authority response information fed back by the user according to the authority granting inquiry, wherein the authority response information comprises an authorization authority and a denial authority; the user terminal is also used for calling album information when the authority response information is the authorization authority, and extracting photos containing faces from the album information as album face information; calling head portrait information in an instant messaging APP of a user and shared information shared in the instant messaging APP, extracting a head portrait containing a face from the head portrait information as head portrait face information, and extracting a picture containing the face from the shared information as shared face information; and sending the photo album face information, the head portrait face information and the shared face information to a server according to the IP address.
Has the advantages that: the user terminal is an intelligent device carried by a person, such as a mobile phone, a tablet and the like. Under the condition of obtaining authorization, calling album information locally stored in the user terminal, and extracting photos containing faces from the album information as album face information; calling the head portrait information and the sharing information of the instant messaging APP installed on the user terminal, extracting the head portrait containing the face from the head portrait information as head portrait face information, and extracting the picture containing the face as sharing face information. And the photos, the head portraits and the pictures containing the human faces are extracted, so that the human faces of the user terminal user can be conveniently analyzed subsequently.
Furthermore, the identity verification terminal is in communication connection with the access control system and is also used for generating an identity verification success signal when receiving a face verification success signal or a secondary verification success signal; the identity verification terminal is further used for sending the generated identity verification success signal to the access control system, so that the access control system can control the opening of the access control.
Has the advantages that: this scheme links with current access control system, when the identity verification succeeds, opens the entrance guard through access control system, supplies the personnel that pass through authentication freely to pass in and out.
Drawings
FIG. 1 is a logic block diagram of a first embodiment of an intelligent security system of the present invention;
fig. 2 is a logic block diagram of a second embodiment of the intelligent security system of the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
The intelligent security system comprises a data acquisition terminal, a reminding terminal, a management terminal and a server, wherein the server comprises a video analysis module, an intrusion recognition module, a security control module and a database, as shown in the attached figure 1. The database stores alarm information, avoidance information and contact information of users. For example, the alarm information is: at present, someone in the house illegally breaks into the house and gives an alarm in time. The avoiding information is as follows: at present, a person intrudes illegally, and in order to ensure the personal safety of a user, the user needs to move to a safe area in the house to avoid, pay attention to locking doors and windows, and give an alarm in time. The contact way is various ways capable of informing the user of the information, for example, the contact way is the mobile phone number of the user, and the information is sent to the management terminal through the contact way. When the scheme is applied to the home of the user, the management terminal is an intelligent terminal carried by the user, such as a mobile phone. When the scheme is applied to enterprises, the management terminal is an intelligent terminal or an intelligent system used by enterprise security departments.
The data acquisition terminal is used for acquiring image information of a security area, and the data acquisition terminal comprises a plurality of cameras arranged in the security area and acquires the image information of the security area through the cameras. In this embodiment, for example, the data acquisition terminal is disposed at a door and a window to acquire image information at the door and the window.
The video analysis module is used for carrying out image recognition on image information in real time to generate the number of indoor personnel, generating a common security signal when the number of the indoor personnel is 0, generating a special security signal when the number of the indoor personnel is not 0, and sending the generated common security signal or the generated special security signal to the security control module. Whether personnel exist in the security area is distinguished through the common security signals and the special security signals, so that different security modes can be conveniently executed subsequently, and the personal safety of indoor personnel is guaranteed.
The intrusion identification module is used for carrying out image identification on the image information to judge whether a person intrudes, generating an intrusion signal when the person intrudes, and generating a safety signal when the person intrudes does not exist. The personnel invasion refers to the behavior that lawbreakers illegally invade the home of a user through lock picking, window turning and the like.
The security control module is used for generating an acousto-optic alarm signal when the intrusion identification module generates an intrusion signal and receives a common security signal, generating a music alarm signal when the intrusion identification module generates an intrusion signal and receives a special security signal, and sending the acousto-optic alarm signal or the music alarm signal to the reminding terminal. The security control module is also used for calling alarm information when generating sound-light alarm signals, sending the alarm information to the management terminal according to the contact way, calling the avoiding information when generating music alarm signals, and sending the avoiding information to the management terminal according to the contact way.
The reminding terminal is preset with music information, and the music information is specific music preset by a user. The reminding terminal is used for sending out sound and light alarm when receiving the sound and light alarm signal and playing preset music information when receiving the music alarm signal. When someone is in a room, the specific music is played, an intruder cannot be irritated without knowing the meaning of the specific music, an indoor user can know the intrusion of someone when hearing the specific music and timely take measures of evasion, alarming and the like, meanwhile, the intruder cannot be excited due to the fact that the intruder is not irritated, evasion time is strived for the indoor user, and meanwhile, the risk of personal injury to the indoor user is reduced.
Example two
For important security areas, the identity of people who enter and exit the security areas needs to be verified. When this scheme is applied to user's family, the security protection region is each region at home, consequently needs the entrance guard department at the gate of family to carry out authentication to the entering personnel. When this scheme is applied to the enterprise, the security protection region can be the work area of enterprise, need carry out authentication to business turn over personnel in the entrance guard department at the enterprise gate promptly, also can be the work area of enterprise's confidential department, need carry out authentication to business turn over personnel in the entrance guard department of confidential department promptly. In the present embodiment, the application to the enterprise confidential department is exemplified.
The authentication mode is various, face identification, fingerprint identification and employee card identification are adopted more at present, but in a special period, in order to avoid the infection of viruses or bacteria, the non-contact authentication mode is more applicable, namely, the face identification is adopted to be safer. However, in a special period, people need to wear the mask, and need to take off the mask when face recognition is performed, and there is a risk of infection when the mask is taken off, so that people wear the mask to perform face recognition, and therefore the accuracy of face recognition is affected. The security area is a working area of an enterprise confidential department, and has very high requirements on security, in other words, the security area has very high requirements on the accuracy of identity verification of people entering and leaving.
In order to solve the problem that the accuracy of face recognition by wearing the mask is affected in the prior art, personal photos are automatically uploaded to perform identity verification in a face recognition mode, but due to the fact that the personal photos are automatically uploaded, the situation that non-personal photos are uploaded easily occurs, the purpose of passing through the identity verification is achieved by falsely using the identities of other people, so that serious potential safety hazards exist in the identity verification, and the safety of a security area cannot be guaranteed.
In this embodiment, as shown in fig. 2, the system further includes an authentication terminal, where the authentication terminal is configured to collect face authentication images of people who enter and exit, and send the face authentication images to the server. The identity authentication terminal comprises a camera arranged at the entrance guard of the enterprise confidential department, and the face authentication images of the personnel entering and exiting the enterprise confidential department are collected through the camera.
The database also prestores the standard human face images and the corresponding standard human face features of the personnel who have the authority of entering and exiting the confidential departments of the enterprises. The server further comprises a feature extraction module, a feature comparison module, a permission acquisition module, an album analysis module, an APP analysis module and a user terminal, and in the embodiment, the user terminal is an intelligent device carried by each person, such as a mobile phone.
The feature extraction module is used for receiving the face verification image, extracting face verification features according to the face verification image and sending the face verification features to the feature comparison module. The feature comparison module is preset with a first matching threshold and a second matching threshold, where the first matching threshold is greater than the second matching threshold, and in this embodiment, the first matching threshold is 95% and the second matching threshold is 80%. The characteristic comparison module is used for comparing the face verification characteristics with the face standard characteristics one by one to generate matching degree. The feature comparison module is further used for generating a face verification success signal when the matching degree is larger than the first matching threshold value, and sending the face verification success signal to the identity verification terminal. And when the matching degree is smaller than or equal to the first matching threshold and larger than the second matching threshold, recording the matching degree and the human face standard characteristics, generating a secondary verification signal, and sending the secondary verification signal to the authority acquisition module. And when all the matching degrees are smaller than or equal to the second matching threshold, generating a face verification failure signal, and sending the face verification failure signal to the identity verification terminal. Because personnel wear the gauze mask and carry out face identification, there is the influence to face identification result, consequently carry out the secondary verification to the higher condition of matching degree in face identification, avoid delaying enterprise personnel's normal business turn over.
And the authority acquisition module is used for receiving the secondary verification signal, generating authority information and sending the authority information to the user terminal. The authority information comprises an authority granting inquiry and an IP address of the server, the information extraction authority granted by the user is obtained through the authority granting inquiry, and the extracted user information is sent back to the server through the IP address.
The user terminal is used for receiving the authority information, displaying the authority granting inquiry and acquiring the authority response information fed back by the user according to the authority granting inquiry, wherein the authority response information comprises the authorization authority and the denial authorization. And when the authority response information is the authorization authority, the representative person agrees to access the user terminal of the person, and when the authority response information is the authorization refusal authority, the representative person does not agree to access the user terminal of the person, at the moment, the representative person can be considered to give up secondary authentication, and the identity authentication fails. The second verification relates to accessing the user terminal and privacy of the personnel, so that the second verification is performed under the condition of authorization of the personnel, when the personnel refuse authorization, in order to guarantee the safety of the security area, the personnel is considered to give up the second verification, and the personnel cannot enter the security area.
The user terminal comprises an information extraction module and an information transmission module. The information extraction module is used for calling album information of the user when the authority response information is the authorization authority, and extracting photos containing faces from the album information as album face information; calling the head portrait information in the instant messaging APP of the user and the sharing information shared in the instant messaging APP, extracting the head portrait containing the face from the head portrait information to serve as head portrait face information, and extracting the picture containing the face from the sharing information to serve as the sharing face information. The information transmission module is used for sending the photo album face information, the head portrait face information and the shared face information extracted by the information extraction module to the server according to the IP address. Instant messaging APP refers to APP with a communication function installed in a user terminal, such as QQ and WeChat, in the embodiment, the instant messaging APP is WeChat, the avatar information is the WeChat avatar of the person, and the sharing information is photos of the WeChat friend circle of the person. Due to the fact that the micro-letter head portrait mostly adopts the head portrait of the user in communication between enterprises or families, which is faced by the micro-letter, the user corresponding to the user terminal is screened out through the micro-letter head portrait to conduct secondary verification.
The photo album analysis module is used for receiving photo album face information, detecting faces in the photo album face information, counting the occurrence times of the same faces, sorting the faces from at least multiple faces according to the occurrence times when counting is finished, and screening N faces before sorting to generate first face information. The value of N is preset in the album analysis module by the system or the enterprise manager, and in this embodiment, the value of N is 3. Most of the photos stored in the album are photos of the user corresponding to the user terminal or photos including the user, so that the first 3 faces with high occurrence frequency are selected as the faces of the user corresponding to the user terminal.
The APP analysis module is used for receiving the head portrait face information and sharing the face information, detecting the head portrait face information, comparing the face in the head portrait face information with the face in the first face information screened out by the album analysis module when the head portrait face information has data, and generating a secondary verification image according to a matching item when the matching item exists. When the head portrait face information has data, it is indicated that the micro message head portrait contains a face, but there are two situations, namely, the face in the micro message head portrait is the face of the user at the user terminal, and the face in the micro message head portrait is the face of a person, such as a star, that the user at the user terminal likes. Therefore, the face in the head portrait face information is compared with the face in the first face information screened by the album analysis module, when the matching item exists between the face in the head portrait face information and the face in the first face information, the matching item is considered as the face of the user at the user terminal, and at the moment, the face is used as a secondary verification image to perform secondary verification.
The APP analysis module is also used for detecting the face in the shared face information when the face in the head portrait face information and the face in the first face information screened by the album analysis module do not have a matching item or the head portrait face information is null data, counting the occurrence times of the same face, sorting the faces at least according to the occurrence times when the counting is finished, and screening the face of M items before sorting to generate second face information. The value of M is preset in the APP analysis module by a system or an enterprise administrator, and in this embodiment, the value of M is 3. And when the face in the head portrait face information does not have a matching item with the face in the first face information screened by the album analysis module, the face in the user terminal WeChat head portrait is the face of a person liked by the user of the user terminal. And when the head portrait face information is empty data, the micro message head portrait does not contain the face. When the two situations occur, the face of the user at the user terminal cannot be determined according to the WeChat head image, so that the photo shared by the friend circle in the WeChat is detected, and the face of the user at the user terminal is confirmed through the photo shared by the friend circle. The APP analysis module is also used for comparing the faces in the screened second face information with the faces in the first face information screened by the album analysis module, when a matching item exists, a secondary verification image is generated according to the matching item, and the secondary verification image is sent to the feature extraction module.
The feature extraction module is also used for receiving the secondary verification image, extracting secondary verification features from the secondary verification image and sending the secondary verification features to the feature comparison module. The feature comparison module is further used for comparing the standard features of the human face recorded by the feature comparison module with the secondary verification features one by one to generate a matching degree. The characteristic comparison module is also used for generating a secondary verification success signal when the matching degree is greater than the first matching threshold value, and sending the secondary verification success signal to the identity verification terminal. And when all the matching degrees are less than or equal to the first matching threshold, generating a secondary verification failure signal, and sending the secondary verification failure signal to the identity verification terminal.
The identity verification terminal is also used for generating and displaying an identity verification failure signal when receiving the face verification failure signal or the secondary verification failure signal, and the person can not enter a security area without passing the identity verification. The identity verification terminal is also used for generating and displaying an identity verification success signal when receiving the face verification success signal or the secondary verification success signal, and the person can enter a security area after passing the identity verification. In other embodiments, the authentication terminal is in communication connection with the access control system, that is, the system communicates with the access control system of an enterprise, the authentication terminal sends the generated authentication success signal to the access control system, and the access control system controls the access control of the security area to be opened for the person to enter the security area.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (6)

1. The intelligent security system comprises a data acquisition terminal, a server and a reminding terminal, wherein the data acquisition terminal is used for acquiring image information of a security area, and the server is used for carrying out image identification on the image information to judge whether personnel invade; the method is characterized in that:
the server is also used for carrying out image recognition on the image information to generate the number of indoor personnel, generating an acousto-optic alarm signal when personnel invade and the number of indoor personnel is 0, generating a music alarm signal when personnel invade and the number of indoor personnel is not 0, and sending the acousto-optic alarm signal or the music alarm signal to the reminding terminal;
the reminding terminal is used for sending out sound and light alarm when receiving the sound and light alarm signal and playing preset music information when receiving the music alarm signal;
the system also comprises an identity verification terminal and a user terminal, wherein the identity verification terminal is used for acquiring face verification images of people who enter and exit;
the server is used for carrying out face recognition according to the face verification image to generate a matching degree, recording face standard characteristics when the matching degree is smaller than or equal to a preset first matching threshold and larger than a preset second matching threshold, and generating authority information to be sent to the user terminal;
the server is also used for receiving photo album face information containing faces, head portrait face information and shared face information fed back by the user terminal, and screening the first N faces with the largest occurrence frequency according to the photo album face information to generate first face information; detecting the head portrait face information, comparing the head portrait face information with the first face information when the head portrait face information has data, and generating a secondary verification image according to a matching item when the matching item exists; when no matching item exists or the head portrait face information is null data, screening the top M faces with the most occurrence times according to the shared face information to generate second face information, comparing the second face information with the first face information, and when a matching item exists, generating a secondary verification image according to the matching item;
the server is also used for carrying out face recognition according to the secondary verification image and the face standard characteristics to generate a matching degree, when the matching degree is greater than a first matching threshold value, a secondary verification success signal is generated, and when all the matching degrees are less than or equal to the first matching threshold value, a secondary verification failure signal is generated.
2. The intelligent security system of claim 1, wherein: the server is further used for sending the alarm information to the management terminal according to the contact way when generating the sound-light alarm signal, and sending the avoidance information to the management terminal according to the contact way when generating the music alarm signal.
3. The intelligent security system of claim 1, wherein: the server comprises a feature extraction module and a feature comparison module, wherein the feature extraction module is used for extracting face verification features according to the face verification image and sending the face verification features to the feature comparison module; the characteristic comparison module is used for comparing the human face verification characteristics with preset human face standard characteristics one by one to generate matching degree.
4. The intelligent security system of claim 1, wherein: the server is also used for generating a face verification success signal when the matching degree is greater than the first matching threshold value, and generating a face verification failure signal when all the matching degrees are less than or equal to the second matching threshold value.
5. The intelligent security system of claim 1, wherein: the user terminal is used for receiving the authority information, and the authority information comprises an authority granting inquiry and an IP address of the server;
the user terminal is also used for displaying the authority granting inquiry and acquiring authority response information fed back by the user according to the authority granting inquiry, wherein the authority response information comprises an authorization authority and a denial authority;
the user terminal is also used for calling album information when the authority response information is the authorization authority, and extracting photos containing faces from the album information as album face information; calling head portrait information in an instant messaging APP of a user and shared information shared in the instant messaging APP, extracting a head portrait containing a face from the head portrait information as head portrait face information, and extracting a picture containing the face from the shared information as shared face information; and sending the photo album face information, the head portrait face information and the shared face information to a server according to the IP address.
6. The intelligent security system of claim 1, wherein: the identity verification terminal is in communication connection with the access control system and is also used for generating an identity verification success signal when receiving a face verification success signal or a secondary verification success signal; the identity verification terminal is further used for sending the generated identity verification success signal to the access control system, so that the access control system can control the opening of the access control.
CN202011193001.4A 2020-10-30 2020-10-30 Intelligent security system Active CN112466078B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011193001.4A CN112466078B (en) 2020-10-30 2020-10-30 Intelligent security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011193001.4A CN112466078B (en) 2020-10-30 2020-10-30 Intelligent security system

Publications (2)

Publication Number Publication Date
CN112466078A CN112466078A (en) 2021-03-09
CN112466078B true CN112466078B (en) 2021-12-24

Family

ID=74835292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011193001.4A Active CN112466078B (en) 2020-10-30 2020-10-30 Intelligent security system

Country Status (1)

Country Link
CN (1) CN112466078B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364733B (en) * 2020-10-30 2022-07-26 重庆电子工程职业学院 Intelligent security face recognition system
CN115909549A (en) * 2022-10-10 2023-04-04 深圳市欧瑞博科技股份有限公司 Intelligent door lock control method and device, computer equipment and storage medium
CN116524569A (en) * 2023-05-10 2023-08-01 深圳大器时代科技有限公司 Multi-concurrency face recognition system and method based on classification algorithm

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609588A (en) * 2008-06-16 2009-12-23 云南正卓信息技术有限公司 Full-automatic anti-intrusion intelligent video monitoring alarm system for unattended villa

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100596197B1 (en) * 2003-08-13 2006-07-03 학교법인 울산공업학원 Face Detection Method Using A Variable Ellipsoidal Mask and Morphological Features
CN101211483A (en) * 2006-12-25 2008-07-02 成都三泰电子实业股份有限公司 Unattended bank safe precaution method
CN201106383Y (en) * 2007-07-27 2008-08-27 浙江邦德光电集团有限公司 Intelligent inburst-proof prewarning notification anti-theft door
CN201435126Y (en) * 2009-06-09 2010-03-31 哈尔滨师范大学 Intelligent night vision anti-theft alarm
CN101989372A (en) * 2010-11-01 2011-03-23 西南石油大学 Human identification-based household anti-theft method and device
CN104732695A (en) * 2013-12-21 2015-06-24 陕西恒发电子科技有限公司 Intelligent room anti-theft device based on human body infrared detection
JP2015141541A (en) * 2014-01-28 2015-08-03 国立研究開発法人科学技術振興機構 Image recognition apparatus, image recognition method and program
CN104851225A (en) * 2014-11-22 2015-08-19 重庆市行安电子科技有限公司 Automatic alarm system
CN208739303U (en) * 2018-09-27 2019-04-12 湖北世科中安科技工程有限公司 A kind of light current security monitoring device of music broadcast system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609588A (en) * 2008-06-16 2009-12-23 云南正卓信息技术有限公司 Full-automatic anti-intrusion intelligent video monitoring alarm system for unattended villa

Also Published As

Publication number Publication date
CN112466078A (en) 2021-03-09

Similar Documents

Publication Publication Date Title
CN112466078B (en) Intelligent security system
KR101610657B1 (en) Three-dimensional virtual entrance control and communicable disease control system and method based on entrance control data
KR101439348B1 (en) Attendance management system using face recognitionaccess control unit
US7679507B2 (en) Video alarm verification
CN110009784A (en) Monitoring joint defence method and apparatus and system and storage medium based on artificial intelligence
CA2713320C (en) Method and apparatus for detecting behavior in a monitoring system
US20070036395A1 (en) Reverse identity profiling system with alert function
CN108269337A (en) A kind of dynamic human face identification gate control system
KR102107203B1 (en) Parking breaker open/close system using portable phone of resident to automatically enter vehicle by parking breaker using KIOSK terminal or tablet PC
CN106408832A (en) Interference-free visitor monitoring method and interference-free visitor monitoring system
CN109286788A (en) A kind of safety defense monitoring system based on cloud computing
CN110189450A (en) A kind of trailing analysis method based on recognition of face and demographics
CN111212274A (en) Intelligent building security system
EP2779133A2 (en) System and method of anomaly detection
CN110619699A (en) Case office building access control system and control method
CN112383615A (en) Residential building entrance guard security system and method based on edge calculation
CN112002094A (en) Cell personnel management method based on triangular positioning
CN112953966A (en) Computer network safety intrusion detection system
CN110580762A (en) Intelligent household access control system and method
KR20200092608A (en) Entrance certification system of Common porch and undergound parking lot and entrance certification method using the same
CN112364733B (en) Intelligent security face recognition system
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
CN107590888A (en) A kind of building are registered one's residence gate control system
JP2009108575A (en) Room entrance/exit control system
JP2006120084A5 (en)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant