CN111784986B - Intelligent security alarm method based on big data - Google Patents

Intelligent security alarm method based on big data Download PDF

Info

Publication number
CN111784986B
CN111784986B CN202010670663.XA CN202010670663A CN111784986B CN 111784986 B CN111784986 B CN 111784986B CN 202010670663 A CN202010670663 A CN 202010670663A CN 111784986 B CN111784986 B CN 111784986B
Authority
CN
China
Prior art keywords
security
data
node
protection
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010670663.XA
Other languages
Chinese (zh)
Other versions
CN111784986A (en
Inventor
周赞和
蒲雪芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEYU HEALTH TECHNOLOGY Co.,Ltd.
Original Assignee
Heyu Health Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heyu Health Technology Co ltd filed Critical Heyu Health Technology Co ltd
Priority to CN202011535319.6A priority Critical patent/CN112489390B/en
Priority to CN202010670663.XA priority patent/CN111784986B/en
Publication of CN111784986A publication Critical patent/CN111784986A/en
Application granted granted Critical
Publication of CN111784986B publication Critical patent/CN111784986B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms

Abstract

The invention relates to the field of big data and intelligent security, and discloses an intelligent security alarm method based on big data, which comprises the following steps: the security identification module judges whether a first trigger event occurs according to the first security data domain; when the first trigger event occurs, the security identification module judges whether a second trigger event occurs according to a second security data domain; when a second trigger event occurs, the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data; the security authentication module obtains a protection warning level according to the security authentication data; when the protection warning level is serious warning, obtaining a security protection area list according to the first protection area data; and the security alarm module sends a protection alarm instruction to the corresponding security node according to the security protection area list. The invention realizes intelligent alarm and peripheral security node cooperative alarm, and improves the alarm accuracy of the security node.

Description

Intelligent security alarm method based on big data
Technical Field
The invention relates to the field of big data and intelligent security, in particular to an intelligent security alarm method based on big data.
Background
The intelligent security is based on technologies such as Internet of things, big data and cloud computing, and people's air defense, physical defense and technical defense are closely combined to form a set of complete security system. The system can be divided into: video monitoring, anti-theft alarm, intelligent analysis, building talkback, access control and the like, thereby effectively ensuring the daily life of people such as work, study, entertainment, traffic and the like.
However, the traditional security system has the disadvantages that the acquisition of alarm information is single, data acquired by various sensors are not fused, and the alarm information obtained by the single sensor cannot accurately identify the information of an intruder, so that false alarm or false alarm of the system is caused; in addition, only the video monitoring consisting of a single camera is used, and the monitoring mode needs a large amount of manpower to carry out monitoring all the day, so that the labor cost is not saved.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an intelligent security alarm method based on big data, which comprises the following steps:
a data acquisition module of the security intelligent alarm platform acquires a first security data domain of a first security node and stores the first security data domain in a database; the first security data field comprises first authentication data and first protection zone data;
the security and protection identification module analyzes whether the first security and protection node generates a first trigger event according to the first identification data;
when a first trigger event occurs, the security identification module acquires a second security data domain of a second security node according to the first protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data; the second security data field comprises second authentication data and second protection zone data;
when a second trigger event occurs, the security authentication module updates the first identification data according to the second identification data to obtain security authentication data;
the security authentication module obtains a protection warning level according to the security authentication data;
when the protection warning level is serious warning, obtaining a security protection area list according to the first protection area data;
and the security protection alarm module sends a protection alarm instruction to the corresponding security protection node according to the security protection area list, and the security protection node responds to the received protection alarm instruction to execute security protection alarm operation.
According to a preferred embodiment, the first security data domain is a security data domain of the first security node, and the security data domain is used for performing security state detection and event analysis on the security node.
The first protection zone data is used for identifying all security nodes in a protection zone where the first security node is located, and the first protection zone data comprises a node identifier of the first security node and a node identifier of the second security node;
the first security node is a target security node; the second security node is the other security nodes except the first security node in the protection area where the first security node is located;
the protection zone is an area which is composed of one or more security nodes and has a comprehensive precaution function.
The protection zone is an area which is composed of one or more types of security nodes and has a comprehensive precaution function.
According to a preferred embodiment, the process of the security authentication module analyzing whether the first triggering event occurs to the first security node according to the first authentication data comprises the following steps:
the security identification module obtains first state characteristic data according to the first identification data; the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value; the state change degree is used for measuring the change degree of the environment in a target monitoring area of the security node;
when the first state change degree is larger than a first state threshold value, a first trigger event is generated, and a security identification module acquires a second security data domain according to the first protection area data;
when the first state change degree is smaller than the first state threshold value, the first triggering event does not occur, and the security protection intelligent alarm platform deletes the first security protection data domain.
According to a preferred embodiment, the process of the security authentication module obtaining the second security data domain according to the first protection zone data comprises: the security identification module acquires a node identifier of a second security node according to the first protection area data;
the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier;
the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module;
and the security identification module judges whether a second trigger event occurs according to the second security data domain.
According to a preferred embodiment, the process of analyzing whether the second trigger event occurs according to the second identification data by the security identification module comprises the following steps: the security and protection identification module obtains second state characteristic data according to the second identification data;
the security identification module acquires standard state characteristic data from the database; the security and protection identification module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value;
when the second state change degree is larger than a second state threshold value, a second trigger event is generated, the security authentication module sends second authentication data to the security authentication module, and the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data;
when the second state change is less than the second state threshold, it indicates that the second trigger event has not occurred.
According to a preferred embodiment, the process of updating the first authentication data by the security authentication module according to the second authentication data to obtain the security authentication data includes:
the security authentication module obtains a node identifier of a second security node according to the first protection area data, and the security authentication module sends an updating request instruction to the second security node according to the node identifier;
the second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module;
and the security authentication module performs data fusion processing on the second identification data and the first identification data to obtain security authentication data.
According to a preferred embodiment, when the protection warning level is a serious warning, the step of obtaining the security protection zone list according to the first protection zone data comprises the following steps:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data;
the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list;
the security protection area list is used for storing node identifiers of security protection nodes in a security protection node protection area where trigger events occur, and the node identifiers comprise a node identifier of a first security protection node where a first trigger event occurs and a node identifier of a second security protection node where a second trigger event occurs.
According to a preferred embodiment, the security authentication module obtains a protection warning level according to the security authentication data; and when the protection warning level is not serious warning, storing the security authentication data in a database for the owner to check.
The invention has the following beneficial effects:
when the current security protection node generates a trigger event, the security protection intelligent alarm platform can also judge whether a second security protection node in the protection area where the security protection intelligent alarm platform is located generates the trigger event, so that cooperative alarm among all security protection nodes in the protection area is realized, the alarm result is accurate, and the security alert degree of the whole protection area is improved.
When a triggering event occurs, the security and protection intelligent alarm platform analyzes the protection alarm level, judges whether to alarm or not according to the protection alarm level, and automatically identifies certain unnecessary alarms so as to achieve intelligent alarm and reduce the consumption of human and material resources caused by false alarm.
Drawings
Fig. 1 is a flowchart of an intelligent security alarm method according to an exemplary embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention.
Referring to fig. 1, in an embodiment, the intelligent security alarm method based on big data of the present invention may include:
s1, the data acquisition module of the security protection intelligent alarm platform acquires a first security protection data domain of the first security protection node and stores the first security protection data domain in the database. The first security data domain is a security data domain of the first security node, and the first security data domain comprises first identification data and first protection area data.
Specifically, the security data domain is used for carrying out security state detection and event analysis on the security nodes; the first identification data comprises video stream data and sensing data. The first protection zone data is used for identifying all security nodes in a protection zone where the first security node is located, and the first protection zone data comprises a node identifier of the first security node and a node identifier of the second security node.
The first security node is a target security node, and the second security node is other security nodes except the first security node in a protection area where the first security node is located.
The video stream data is obtained by compressing and coding original video image data collected in a target monitoring area by a security node through a video compression technology.
Optionally, the security node is a device for checking the security state of a target monitoring area in the protection area, and includes a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a spatial movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera, and a web camera.
Optionally, the protection area is an area with a comprehensive precaution function and composed of one or more security nodes, and the security nodes may include one or more types.
S2, the security authentication module analyzes whether the first security node generates the first trigger event according to the first authentication data.
Specifically, the process that the security authentication module analyzes whether the first security node generates the first trigger event according to the first authentication data includes:
the security identification module obtains first state characteristic data according to the first identification data; the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value. The state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
Specifically, the feature extraction unit of the security identification module obtains a first state feature vector according to the first state feature data,
A=[a1,a2…an]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the security identification module calculates a first state change degree according to the first state feature vector and the standard state feature vector,
Figure BDA0002582163600000061
where n is the number of state features, i is the state feature index, c is the first state change degree, aiFirst state value of i-th state feature, biIs the standard state value of the ith state feature.
When the first state change degree is larger than a first state threshold value, a first trigger event is generated, and the security identification module acquires a second security data domain according to the first protection area data.
When the first state change degree is smaller than the first state threshold value, the first triggering event does not occur, and the security protection intelligent alarm platform deletes the first security protection data domain.
Optionally, the first state threshold is a critical value preset by an administrator to determine that the first trigger event occurs, and the state change degree is used to measure the environmental similarity. The standard state characteristic data is data which is pre-configured by an administrator according to the equipment parameters of the security node in the normal state in the target monitoring area.
Optionally, the first trigger event is a change of an environment occurring in a target monitoring area of the first security node.
S3, when the first trigger event occurs, the security identification module obtains a second security data domain of the second security node according to the first protection area data.
Specifically, the process that the security identification module obtains the second security data domain according to the first protection area data comprises the following steps: the security identification module acquires a node identifier of a second security node according to the first protection area data; the security and protection identification module sends a state judgment instruction to the second security and protection node according to the node identifier; and the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module.
S4, the security protection identification module analyzes whether a second trigger event occurs according to the second identification data, and the second security protection data domain comprises the second identification data and second protection area data.
Specifically, the process of analyzing whether the second trigger event occurs according to the second identification data by the security identification module includes: the security and protection identification module obtains second state characteristic data according to the second identification data; the security identification module acquires standard state characteristic data from the database; and the security and protection identification module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value.
Specifically, the feature extraction unit of the security identification module obtains a second state feature vector according to the second state feature data:
D=[d1,d2…dn]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
the state change degree calculation unit of the security identification module calculates a second state change degree according to the second state feature vector and the standard state feature vector,
Figure BDA0002582163600000071
where n is the number of state features, i is the state feature index, t is the second state change degree, diSecond state value of i-th state feature, biIs the standard state value of the ith state feature.
When the second state change degree is smaller than the second state threshold value, the second triggering event is generated, the security authentication module updates the first identification data according to the second identification data to obtain security authentication data, and when the second state change degree is larger than the second state threshold value, the second triggering event is not generated.
When the second trigger event does not occur, step S4.1 is executed: the security and protection identification module acquires a node identifier of the second security and protection node according to the first protection area data and sends security and protection warning information to the second security and protection node according to the node identifier.
Optionally, the second trigger event is a change of an environment in a target monitoring area of the second security node. The safety warning information is used for informing a second security protection node in the protection area where the first security protection node is located to improve the safety warning degree and strengthen the monitoring degree.
And S5, when a second trigger event occurs, the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data.
Specifically, the process of updating the first identification data by the security authentication module according to the second identification data to obtain the security authentication data includes:
and the security authentication module obtains a node identifier of the second security node according to the first protection area data of the first security data domain, and sends an update request instruction to the second security node according to the node identifier.
The second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module; and the security authentication module performs data fusion processing on the second identification data in the second security data domain and the first identification data to obtain security authentication data.
Optionally, the data fusion process includes: the security authentication module adds the node identifier of the first security node to video stream data and sensor data in the first authentication data according to the first security data domain; and the security authentication module adds the node identifier of the second security node to the video stream data and the sensor data in the second authentication data according to the second security data domain.
The security authentication module performs fusion processing on the video stream data added with the node identifier of the first security node and the video stream data added with the node identifier of the second security node to obtain first metadata; and the security authentication module performs fusion processing on the sensing data added with the node identifier of the first security node and the sensing data added with the node identifier of the second security node to obtain second metadata. And the security authentication module integrates the first metadata and the second metadata to obtain security authentication data.
S6, the security authentication module obtains a protection warning level according to the security authentication data, and the protection warning level comprises: no warning, ordinary warning and serious warning. And when the protection warning level is serious warning, obtaining a security protection area list according to the first protection area data and the second protection area data.
Specifically, the process of the security authentication module obtaining the protection warning level according to the security authentication data includes: the security authentication module obtains a dimension characteristic vector X ═ X according to the security authentication data1,x2,…,xn](ii) a The security authentication data acquires alarm standard data from the database, and acquires a first characteristic vector Y according to the alarm standard data1=[y1,y2,…,yn]Second feature vector Y2=[y1,y2,…,yn]And a third feature vector Y3=[y1,y2,…,yn]. Calculating a first matching degree M of the dimension feature vector and the first feature vector1Second degree of matching M of the dimensional feature vector with the second feature vector2Third degree of matching M of the dimensional feature vector and the third feature vector3. Wherein
Figure BDA0002582163600000091
Comparison M1,M2,M3The size of (2). If M is1At minimum, the protection alert level is no alert at this time, if M2At the minimum, the protection warning level is the ordinary warning at this moment, if M3At a minimum, the protection alert level is now a severe alert.
Specifically, the security authentication module obtains a protection warning level according to the security authentication data, and when the protection warning level is serious warning, the step of obtaining a security protection area list according to the first protection area data includes:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data; and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
The security protection area list is used for storing node identifiers of security nodes in the security node protection area where the trigger event occurs, and the node identifiers comprise a node identifier of a first security node where a first trigger event occurs and a node identifier of a second security node where a second trigger event occurs.
Optionally, when the protection warning level is a serious warning, it is indicated that the trigger event in the target monitoring area of the security node meets the alarm condition, and the security authentication module obtains a security protection area list according to the first protection area data.
Optionally, when the protection warning level is not a serious warning, the security authentication module stores the security authentication data in the database for the owner to check.
S7, the security alarm module sends the protection alarm instruction to the corresponding security node according to the security protection area list, and the security node responds to the received protection alarm instruction to execute security alarm operation.
When the current security protection node generates a trigger event, the security protection intelligent alarm platform can judge whether a second security protection node in a protection area where the security protection intelligent alarm platform is located generates the trigger event or not, so that the condition of false alarm is prevented, and safety alarm information is sent to the second security protection node which does not generate the trigger event, so that the second security protection node can improve the monitoring force on a target area after receiving the safety alarm information, and the safety is ensured.
In another embodiment, after the security alarm is completed, the security intelligent alarm platform updates the first state threshold and the second state threshold respectively according to the security alarm result to obtain a first updated threshold and a second updated threshold, and the first updated threshold and the second updated threshold are used as the first state threshold and the second state threshold of the next security alarm to improve the accuracy of the next security alarm.
Specifically, the recognition rate of the first trigger event is maximized, and the threshold at this time is used as a first update threshold, and the formula for maximizing the recognition rate of the first trigger event is as follows:
max R=(Gθ-Q) s.t α∈[x1,y1]β∈[x2,y2]
wherein R is the first triggerThe identification rate of the event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first trigger event, theta is the identification coefficient, Q is the false negative rate of the first trigger event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
The method of updating the second state threshold to obtain the second updated threshold is the same as the method described above.
In the embodiment, after the security alarm is completed each time, the security intelligent alarm platform updates the first state threshold and the second state threshold, so that the identification rate of the trigger event is improved in the next security alarm, the more the security alarm times are, the higher the accuracy rate of the security alarm is, and the situations of false alarm and alarm missing are avoided.
In another embodiment, the process of the security authentication module obtaining the protection alert level according to the security authentication data includes: the security authentication module obtains target characteristic data according to the security authentication data, and the security authentication module obtains the number of target types according to the target characteristic data and compares the number with a target type threshold value;
when the number of the target types is smaller than the target type threshold value, the security authentication module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is no warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is a common warning.
When the number of the target types is larger than the target type threshold value, the security authentication module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is ordinary warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is serious warning.
The security protection intelligent alarm platform analyzes the target of the target monitoring area of the security protection node, whether the target in the target monitoring area meets the alarm condition is judged according to the preset index of the monitoring demand party, when the alarm condition is met, the corresponding security protection node executes the alarm action, and the characteristic information of the target is stored under the condition that the alarm condition is not met so as to be automatically checked by an owner, so that intelligent alarm is achieved, the owner is prevented from frequently going to and between alarm points under the condition that certain trigger events do not need to alarm, the consumption of manpower and material resources is reduced, and the alarm accuracy of the security protection node is improved.
In one embodiment, an intelligent security alarm system for performing an intelligent security alarm method includes a security intelligent alarm platform and a security node. The security protection intelligent alarm platform and the security protection node are in communication connection, and the security protection node is used for checking the equipment of the security state of the target monitoring area, and the equipment comprises but is not limited to: the system comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
The security protection intelligent alarm platform comprises a data acquisition module, a security protection identification module, a security protection authentication module, a security protection alarm module and a database, wherein the modules are in communication connection with one another.
The data acquisition module is configured to acquire a first security data domain of a first security node and store it in a database.
The security authentication module is configured to analyze whether a first trigger event occurs to the first security node according to the first authentication data, and analyze whether a second trigger event occurs according to the second authentication data when the first trigger event occurs.
The security authentication module is configured to update the first authentication data according to the second authentication data to obtain security authentication data, analyze the security authentication data to obtain a protection warning level, and then generate a security protection zone list according to the first protection zone data when the protection warning level is a serious warning.
The security alarm module is configured to send a protection alarm instruction to the corresponding security node according to the security protection zone list.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. An intelligent security alarm method based on big data is characterized by comprising the following steps:
a data acquisition module of the security intelligent alarm platform acquires a first security data domain of a first security node and stores the first security data domain in a database; the first security data field comprises first authentication data and first protection zone data;
the security and protection identification module analyzes whether the first security and protection node generates a first trigger event according to the first identification data;
when a first trigger event occurs, the security identification module acquires a second security data domain of a second security node according to the first protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data; the second security data field comprises second authentication data and second protection zone data;
when a second trigger event occurs, the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data; the security authentication module obtains a node identifier of a second security node according to the first protection area data and sends an updating request instruction to the second security node according to the node identifier; the second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module; the security authentication module performs data fusion on the second identification data and the first identification data to obtain security authentication data;
the security authentication module obtains a protection warning level according to the security authentication data;
when the protection warning level is serious warning, obtaining a security protection area list according to the first protection area data;
and the security protection alarm module sends a protection alarm instruction to the corresponding security protection node according to the security protection area list, and the security protection node responds to the received protection alarm instruction to execute security protection alarm operation.
2. The method of claim 1, wherein the first security data domain is a security data domain of a first security node, and the security data domain is used for security state detection and event analysis of the security node;
the first protection zone data is used for identifying all security nodes in a protection zone where the first security node is located, and the first protection zone data comprises a node identifier of the first security node and a node identifier of the second security node;
the first security node is a target security node; the second security protection node is a security protection node except the first security protection node in the protection area where the first security protection node is located.
3. The method of claim 2, wherein the security authentication module analyzing whether the first trigger event occurs at the first security node based on the first authentication data comprises:
the security identification module obtains first state characteristic data according to the first identification data; the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first trigger event occurs or not; and the state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
4. The method of claim 3, wherein the obtaining, by the security authentication module, the second security data field from the first protected zone data comprises:
the security identification module acquires a node identifier of a second security node according to the first protection area data;
the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier;
the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module;
and the security identification module judges whether a second trigger event occurs according to the second security data domain.
5. The method according to claim 4, wherein the security authentication module obtains second state characteristic data according to the second authentication data;
the security identification module acquires standard state characteristic data from the database;
and the security and protection identification module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value to judge whether a second trigger event occurs.
6. The method of claim 5, wherein obtaining the security protection zone list according to the first protection zone data when the protection alert level is a severe alert comprises:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data;
and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
7. The method of claim 6, wherein the list of security zones is used to store node identifiers of security nodes within the security node zone where the triggering event occurred,
the node identifier of the security node comprises: the node identifier of the first security node where the first trigger event occurs and the node identifier of the second security node where the second trigger event occurs.
8. The method of claim 7, wherein the security authentication module obtains a protection alert level according to the security authentication data;
and when the protection warning level is not serious warning, storing the security authentication data in a database for the owner to check.
CN202010670663.XA 2020-07-13 2020-07-13 Intelligent security alarm method based on big data Active CN111784986B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011535319.6A CN112489390B (en) 2020-07-13 2020-07-13 Security node collaborative alarm method based on intelligent security
CN202010670663.XA CN111784986B (en) 2020-07-13 2020-07-13 Intelligent security alarm method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010670663.XA CN111784986B (en) 2020-07-13 2020-07-13 Intelligent security alarm method based on big data

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202011535319.6A Division CN112489390B (en) 2020-07-13 2020-07-13 Security node collaborative alarm method based on intelligent security

Publications (2)

Publication Number Publication Date
CN111784986A CN111784986A (en) 2020-10-16
CN111784986B true CN111784986B (en) 2021-02-09

Family

ID=72767640

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011535319.6A Active CN112489390B (en) 2020-07-13 2020-07-13 Security node collaborative alarm method based on intelligent security
CN202010670663.XA Active CN111784986B (en) 2020-07-13 2020-07-13 Intelligent security alarm method based on big data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202011535319.6A Active CN112489390B (en) 2020-07-13 2020-07-13 Security node collaborative alarm method based on intelligent security

Country Status (1)

Country Link
CN (2) CN112489390B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982634A (en) * 2012-11-13 2013-03-20 上海交通大学 Human intrusion detection method with audio and video integration
US10650593B2 (en) * 2016-07-12 2020-05-12 Tyco Fire & Security Gmbh Holographic technology implemented security solution

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3369019D1 (en) * 1982-10-01 1987-02-12 Cerberus Ag Infrared detector for spotting an intruder in an area
DE69633524T2 (en) * 1995-04-12 2005-03-03 Matsushita Electric Industrial Co., Ltd., Kadoma Method and device for object detection
JP3885019B2 (en) * 2002-11-29 2007-02-21 株式会社東芝 Security system and mobile robot
SG120208A1 (en) * 2004-08-27 2006-03-28 Singapore Tech Dynamics Pte
CN2802874Y (en) * 2005-07-11 2006-08-02 北京讯飞信息技术有限公司 Sensor network video monitoring system
GB2442603B (en) * 2006-10-05 2009-06-17 Northrop Grumman Corp systems and methods for detecting change in a monitored enviroment
JP2009163396A (en) * 2007-12-28 2009-07-23 Sogo Keibi Hosho Co Ltd Security device and abnormality notification method
US7902977B2 (en) * 2008-02-21 2011-03-08 Honeywell International Inc. Integrated multi-spectrum intrusion threat detection device and method for operation
CN101872536A (en) * 2010-06-24 2010-10-27 北京航空航天大学 System for monitoring intrusion on basis of wireless sensor network
CN102781032B (en) * 2011-05-09 2015-03-18 中国人民解放军海军航空工程学院 Correlation-based multi-sensor collaborative target detection method
CN203260135U (en) * 2013-04-19 2013-10-30 孙玉绘 Wireless home furnishing security system with multiple sensors integrated
US9384656B2 (en) * 2014-03-10 2016-07-05 Tyco Fire & Security Gmbh False alarm avoidance in security systems filtering low in network
CN106463034B (en) * 2014-05-08 2019-11-05 泰科消防及安全有限公司 Dual detector ability intruding detection system and method and its configuration system and method
US10515372B1 (en) * 2014-10-07 2019-12-24 State Farm Mutual Automobile Insurance Company Systems and methods for managing building code compliance for a property
CN104299346B (en) * 2014-10-31 2017-10-24 王烨辉 Household safety-protection method and system
CN104700524B (en) * 2014-12-31 2018-02-13 大亚湾核电运营管理有限责任公司 The comprehensive security response system and device in multicomputer nuclear power base
US9589436B2 (en) * 2015-05-26 2017-03-07 Google Inc. Systems and methods for announcing location of unauthorized party
US9940826B1 (en) * 2017-02-22 2018-04-10 Honeywell International Inc. Sensor data processing system for various applications
WO2018175495A1 (en) * 2017-03-20 2018-09-27 Oy Halton Group Ltd. Fire safety devices methods and systems
CN107025747B (en) * 2017-05-31 2019-06-14 桂林电子科技大学 The smart home intruding detection system and detection method of space-time two-dimensional information fusion
CN107170166A (en) * 2017-07-14 2017-09-15 四川中科通服智能安防科技有限公司 Defence area supervising device and intelligent security guard cloud platform
US11102492B2 (en) * 2018-02-20 2021-08-24 Arlo Technologies, Inc. Multi-sensor motion detection
CN108573584A (en) * 2018-04-23 2018-09-25 深圳市沃特沃德股份有限公司 Intelligent sound and monitoring system and method based on intelligent sound
CN108986371A (en) * 2018-05-29 2018-12-11 沈阳远大装备科技有限公司 A kind of circumference security protection aware communications method and communication device
CN108847005A (en) * 2018-07-05 2018-11-20 北京宏大和创防务技术研究院有限公司 Integral network safety defense system and its control method are beaten in unattended examining
CN109686028A (en) * 2018-12-27 2019-04-26 中国电子科技集团公司第十一研究所 A kind of mobile intrusion target telemetering alarm combination unit
CN110491100A (en) * 2019-09-30 2019-11-22 山东佳安保全安防科技有限公司 A kind of alarm technique wrong report discriminating method based on Internet of Things

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982634A (en) * 2012-11-13 2013-03-20 上海交通大学 Human intrusion detection method with audio and video integration
US10650593B2 (en) * 2016-07-12 2020-05-12 Tyco Fire & Security Gmbh Holographic technology implemented security solution

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于系统风险熵的化工园区风险态势预测预警研究";张良;《中国优秀硕士学位论文全文数据库工程科技I辑》;20170215;B015-178 *

Also Published As

Publication number Publication date
CN112489390A (en) 2021-03-12
CN111784986A (en) 2020-10-16
CN112489390B (en) 2022-05-10

Similar Documents

Publication Publication Date Title
EP3497590B1 (en) Distributed video storage and search with edge computing
US8253564B2 (en) Predicting a future location of a moving object observed by a surveillance device
CN109740411A (en) Intelligent monitor system, monitoring method based on recognition of face and quickly go out alarm method
US20240054791A1 (en) Information processing apparatus, information processing method, and program
JP2011523106A (en) Image sensor, alarm system and method for classifying objects and events
CN109788242B (en) Rescue system, rescue method and server used by rescue system
CN111862380B (en) Intelligent security inspection management method
US7295106B1 (en) Systems and methods for classifying objects within a monitored zone using multiple surveillance devices
WO2018232846A1 (en) Large-scale peripheral security monitoring method and system
CN109040681A (en) Switchgear house intelligence O&M terminal based on video analysis
CN109410497A (en) A kind of monitoring of bridge opening space safety and alarm system based on deep learning
CN112132048A (en) Community patrol analysis method and system based on computer vision
CN109963113B (en) Method and device for monitoring interested target
CN111784986B (en) Intelligent security alarm method based on big data
CN111784987B (en) Intelligent security alarm system
CN111968324A (en) Big data-based intelligent community security alarm system
CN112885013A (en) Monitoring and early warning method and device and readable storage medium
Hubner et al. Audio-video sensor fusion for the detection of security critical events in public spaces
US20230114160A1 (en) Monitoring device, monitoring method, and recording medium
KR101041851B1 (en) Sensor network for estimating target size and method thereof
CN113657508A (en) Multi-dimensional information fusion security system decision method and device, computer equipment and storage medium
Penna et al. Stampede monitoring and alarm system using Viola-Jones algorithm
CN117830960A (en) Smart community-based risk identification method, device, equipment and medium
CN117576642A (en) Vehicle supervision method, device, electronic equipment and storage medium
CN115116192A (en) Security protection monitored control system based on intelligent robot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Zhou Zanhe

Inventor after: Pu Xueqin

Inventor before: Pu Xueqin

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20210121

Address after: Room 2003, 1801, 1804, No.13-1, Hai'an Road, Tianhe District, Guangzhou, Guangdong 510627

Applicant after: HEYU HEALTH TECHNOLOGY Co.,Ltd.

Address before: 628000 Xuefeng Qiao Road 338, Lizhou District, Guangyuan, Sichuan

Applicant before: GUANGYUAN LIANGZHIHUI TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant