CN104157087A - Realization method of active intelligent security protection system - Google Patents

Realization method of active intelligent security protection system Download PDF

Info

Publication number
CN104157087A
CN104157087A CN201410417699.1A CN201410417699A CN104157087A CN 104157087 A CN104157087 A CN 104157087A CN 201410417699 A CN201410417699 A CN 201410417699A CN 104157087 A CN104157087 A CN 104157087A
Authority
CN
China
Prior art keywords
security protection
active
main frame
protection system
intelligent security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410417699.1A
Other languages
Chinese (zh)
Inventor
钟亦云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410417699.1A priority Critical patent/CN104157087A/en
Publication of CN104157087A publication Critical patent/CN104157087A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an intelligent security protection method capable of realizing active identification of legality and illegality. The method overthrows a conventional passive security protection architecture, realizes active damage prevention of a monitoring area in an active intelligent mode, is controllable apart from security protection, and transforms conventional after-event protection into present advance prevention. The intelligent security protection system capable of the active identification of the legality and the illegality has the advantages of high concealment and high reliability, there are no damage effects even in case of commercial power failure and machinery damage, a system still works, and alarms are still given.

Description

The initiatively implementation method of intelligent safety and defence system
Technical field
Involved in the present invention to be electronics security protection industry.
Technical background
In current security protection industry, nearly all traditional security protection framework: be provided as image signal and this signal is transferred to supervisory control comuter by camera, then by supervisory control comuter, it " is not leaked " and is recorded in the disk of computing machine for one second, but, this gives the monitoring calculation of management function, can not autonomous classification which be occurent to the prejudicial behavior of user benefit, even if occur, it is " record is no matter stop by all means " still.
Just have to ask someone " to have seen monitoring " in order to solve this difficult problem at present,, monitor staff also has in " leaving post ", even if monitor staff is in monitoring, also there is the problem of video switch frequency, so, result often: the loss that should not occur has occurred in the same old way, look at it is who is so bold so have to " adjust monitoring ", Here it is " wise afterwards ".
Here it is current known monitoring.
Security protection how about, also be to remove to catch corresponding signal by various probes, as long as signal has been triggered and has just offered main control module, main control module converts sound, the light of appointment to this signal again or delivers to owner's mobile phone, tries to attend to big and small matters all at once, of a specified duration, also very tired, even if occurred to be processed dangerously, because tired, not necessarily can go to have seen.
The effect avoiding damage for conscientiously making security protection play, that should not " make a noise " does not just want " making a noise ", certain " the crying " that must " cry ", attempt or ongoing act of embezzlement " are strangled " in bud, become " Zhuge afterwards " into " prevention and control in advance ", therefore, released the present invention.
Summary of the invention
Object of the present invention: attempt or ongoing act of embezzlement " are strangled " in bud.
Adopt to achieve the object of the present invention following technical scheme: the device (this is described " main frame ") being made up of multiple single-chip microprocessor systems carries out management and the monitoring of top layer.
At the scene of deploying to ensure effective monitoring and control of illegal activities or control point, placed the supervision scene of the device (this is described " teleseme ") that specially watching of respective numbers monitor site environment by owner oneself according to the controllable scope of equipment; As long as have personnel to enter or monitored object abnormal (as gas overrich or too low, too high or too low for temperature, humidity is too high or too low), described teleseme all will produce corresponding action response; Whether send to described main frame to be also the grant instruction of described main frame to it this response; If described teleseme does not send while or not, just do not produce less radio-frequency transmitted signal yet.
At the scene or personnel gateway place the device of specially watching data transmit-receive that formed by single chip microcomputer (this is described " cipher machine ").
Place microcam or pinhole camera at sensitive part or important monitored space, can open recording function by host command if desired and carry out the collection of image scene, can effectively extend like this serviceable life of video camera, while ensureing key, can use.
If desired, in position placement sound, light alarm assemblies, carry out Based Intelligent Control by described main frame, can effectively frighten resistance lawless people.
In the time having people to enter control point or specifically monitored object is abnormal, described teleseme makes an immediate response, form (global disclosed ISM band 2.4G radio frequency) with wireless transmission under the prerequisite that allows to report is given described main frame this signal reporting, described main frame from " personnel enter or the object abnormal " signal that receives that described teleseme sends, timing.
Described main frame timing to set time also do not receive legal identity information (unauthorized person does not have the legal identity information of native system certainly), described main frame just assert that these personnel are for unauthorized person, now described main frame sends SMS notification call to owner, if desired, described main frame also can issuing command be opened microcam or pinhole camera is made a video recording, also can open if desired acoustooptic alarm system, frighten the further action of resistance unauthorized person.
If competent person enters, because everyone has the identity information of oneself, as long as send out legal identity information by described cipher machine to described main frame, described main frame is judged the corresponding actions that just can not make warning while being competent person.
By the identification of identity information, what just ensured " to make a noise " just " does not make a noise ", certain " the crying " that must " cry ".
Sending identity information to described main frame, can certainly be fingerprint image data, facial image data, the most frequently used the safest current should be digital cipher, doing identity information with it is most economical scheme.
Positive effect of the present invention is: first effective, change from passive to active, and become and investigate as Prior Control afterwards, conscientiously prevent the further infringement of unauthorized person, efficiently and effectively protection user's property is not stolen; Secondly use cost is low, except reporting to the police, can not use 2G/3G network, and what in system, use is the disclosed free wireless channel in the whole world entirely, only under alarm condition or figure is convenient arranges and just can use 2G/3G network with mobile phone; The more important thing is that disguise and reliability are high, even if lawless people wants to destroy safety-protection system, possibility hardly, even if the civil power of the control point that broken is of no avail, system, in the same old way in work, in monitoring, can be reported to the police, also can be by mobile phone control corresponding assembly.
Brief description of the drawings
Below in conjunction with accompanying drawing, technical solution of the present invention is further illustrated
Embodiment
The installation of security device: place described teleseme (this machine is used civil power usually in control point, from having uninterrupted power source), described main frame is positioned over the place of relatively hiding, and (this machine is used civil power usually, from having uninterrupted power source), described cipher machine is positioned over the place (portable power source power supply) of easily getting conveniently, is convenient to enter the identity key that sends conveniently oneself behind control point.
Each control point (monitored space) has a described teleseme at least, when there being people to enter control point or monitored object when abnormal, under the prerequisite that described teleseme will send in license, send " personnel enter " or " object is abnormal " signal with radio frequency, described main frame starts countdown after receiving this signal.
If competent person enters, within the time of setting, can my identity information be sent to described main frame with described cipher machine, it is after competent person, not start alarm flow that described main frame is judged.
If what enter is unauthorized person, because itself there is no legal identity data, cannot input legal identity information at setting-up time, described main frame just starts alarm flow,
According to owner's setting, can be set in automatic video camera or text message remote control unlatching video camera, the also same video camera of alarm lamp and loudspeaker opening ways opened under alarm condition.
Owner, in the time hearing that only calling out uniqueness that three sound have just hung calls out, looks over mobile phone, if what receive is safety anti-theft apparatus number and content while being SOS, is met accident certainly, and the warning of Here it is described main frame is done.

Claims (3)

1. the implementation method of the active intelligent safety and defence system described in patent of the present invention, it is characterized in that: automatically differentiate legal and illegal signals, be only unauthorized person while entering monitoring point or monitored object abnormal signal, just can start alarm flow, legal signal safety-protection system does not start alarm flow.
2. require described method according to right 1, it is characterized in that: while having trigger pip, just can start identification flow, discriminating is legal and illegal.
3. require described method according to right 1, it is characterized in that: be only when unauthorized person enters or monitored object is abnormal, just to start alarm flow.
CN201410417699.1A 2014-08-18 2014-08-18 Realization method of active intelligent security protection system Pending CN104157087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410417699.1A CN104157087A (en) 2014-08-18 2014-08-18 Realization method of active intelligent security protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410417699.1A CN104157087A (en) 2014-08-18 2014-08-18 Realization method of active intelligent security protection system

Publications (1)

Publication Number Publication Date
CN104157087A true CN104157087A (en) 2014-11-19

Family

ID=51882575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410417699.1A Pending CN104157087A (en) 2014-08-18 2014-08-18 Realization method of active intelligent security protection system

Country Status (1)

Country Link
CN (1) CN104157087A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003007260A1 (en) * 2001-07-12 2003-01-23 Sensormatic Electronics Corporation Antitheft system
CN1700258A (en) * 2004-05-19 2005-11-23 庞维克 Open type gate inhibition unlawful penetration alarm device
CN1725250A (en) * 2005-06-13 2006-01-25 施俊 Safety alarm system for automatic identification identity and decision illegal intrusion
CN2809738Y (en) * 2005-07-11 2006-08-23 北京银晨北方科技有限公司 RF card identification entrance control system with automatic human face identification
CN201465205U (en) * 2009-07-03 2010-05-12 深圳市永达电子股份有限公司 Equipment cabinet device with the function of automatically short-message alarming under abnormal condition
US8237562B1 (en) * 2007-11-19 2012-08-07 Impinj, Inc. Dealing with rogue RFID readers using tag identifiers
CN102682553A (en) * 2012-03-27 2012-09-19 南京邮电大学 Anti-theft alarming system based on radio frequency tag technology
CN103198596A (en) * 2013-03-22 2013-07-10 成都狼嗅科技有限公司 Intelligent network alarm system and implementation method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003007260A1 (en) * 2001-07-12 2003-01-23 Sensormatic Electronics Corporation Antitheft system
CN1700258A (en) * 2004-05-19 2005-11-23 庞维克 Open type gate inhibition unlawful penetration alarm device
CN1725250A (en) * 2005-06-13 2006-01-25 施俊 Safety alarm system for automatic identification identity and decision illegal intrusion
CN2809738Y (en) * 2005-07-11 2006-08-23 北京银晨北方科技有限公司 RF card identification entrance control system with automatic human face identification
US8237562B1 (en) * 2007-11-19 2012-08-07 Impinj, Inc. Dealing with rogue RFID readers using tag identifiers
CN201465205U (en) * 2009-07-03 2010-05-12 深圳市永达电子股份有限公司 Equipment cabinet device with the function of automatically short-message alarming under abnormal condition
CN102682553A (en) * 2012-03-27 2012-09-19 南京邮电大学 Anti-theft alarming system based on radio frequency tag technology
CN103198596A (en) * 2013-03-22 2013-07-10 成都狼嗅科技有限公司 Intelligent network alarm system and implementation method thereof

Similar Documents

Publication Publication Date Title
US10482758B1 (en) Detecting destruction of an automation system component
CN201681464U (en) Prison security system
CN103370717B (en) Always-available embedded theft reaction subsystem
US20160163185A1 (en) System and method for identifying alarm system problems
CN102708661A (en) Remote video monitoring alarm system and method
CN103558821A (en) Factory intelligence application system based on Internet-of-Thing platform
CA2975933A1 (en) Smart device distributed security system
KR100769562B1 (en) Emergency alarm system and method
CN106097638A (en) A kind of intelligent building security joint defense system
WO2016165423A1 (en) Theft prevention method, antitheft device, and computer storage medium
CN103544756A (en) Plant area security and protection linkage control method based on internet-of-things platform
PL2220625T3 (en) Method for the reliable and targeted suppression of alarms in a monitoring and control centre
CA2894201A1 (en) System and method of communicating data from an alarm system to emergency services personnel
CN112863101A (en) Power distribution room environment and safety monitoring method and system
CN204348013U (en) A kind of burglar alarm supervising device of door and window passive infrared detection
CN104853169B (en) Personal portable mobile monitoring and home service platform
CN105575020A (en) Intelligent building monitoring system
CN103561081A (en) Factory firefighting linkage control method based on Internet-of-Thing platform
ITUB20155911A1 (en) SAFETY AND ALARM SYSTEM
CN104157087A (en) Realization method of active intelligent security protection system
KR101594053B1 (en) Security System Through Convergence Solutions
CN103186969A (en) Community security and protection monitoring system
CN201927139U (en) National networking anti-theft system for neighborhood security
CN103428369A (en) Working method of mobile station terminal in pseudo-shutdown mode and mobile station terminal
CN104113723A (en) Antitheft door monitoring device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141119