CN105931316A - Intelligent area monitoring method - Google Patents

Intelligent area monitoring method Download PDF

Info

Publication number
CN105931316A
CN105931316A CN201510949035.4A CN201510949035A CN105931316A CN 105931316 A CN105931316 A CN 105931316A CN 201510949035 A CN201510949035 A CN 201510949035A CN 105931316 A CN105931316 A CN 105931316A
Authority
CN
China
Prior art keywords
personnel
monitoring
image
region
legal identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510949035.4A
Other languages
Chinese (zh)
Inventor
胡万强
王红玲
张元敏
张广韬
耿跃峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuchang University
Original Assignee
Xuchang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuchang University filed Critical Xuchang University
Priority to CN201510949035.4A priority Critical patent/CN105931316A/en
Publication of CN105931316A publication Critical patent/CN105931316A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Abstract

The invention provides an intelligent area monitoring method, comprising the steps of: presetting a first monitoring area and a first monitoring device, a second monitoring area and a second monitoring device; acquiring the first monitoring data of the first monitoring area and second monitoring data of the second monitoring area; according to the first monitoring data, determining whether a person image exists, if it does, conducting facial identification and continuing subsequent steps, otherwise quitting the subsequent steps; determining whether the personnel corresponding to the personnel image enters the second monitoring area, if it does, continuing subsequent steps otherwise quitting the subsequent steps; according to the face recognition results, determining whether the personnel corresponding to the personnel image has legal identification, if it does, conducting subsequent steps, otherwise sending an illegal identification alarm; determining whether the first monitoring data contains following personnel, if not, automatically opening the door. The method realizes the determination of the legitimate users, and can find the trailing person in both hiding and pretending conditions, and automatically opens the door for the legitimate users.

Description

A kind of Intelligent region monitoring method
Technical field
The present invention relates to Smart Home, intelligent monitoring and intelligent security guard system, in particular, a kind of Intelligent region monitoring method.
Background technology
Existing region, such as household or community etc., its monitoring and security protection realize often through photographic head, such as, one photographic head is being set in front of the door, but, photographic head often can only monitor a small region, and the resident family the biggest one section of region before door does not ensure, also tailer cannot be taken precautions against, especially malice tailer, hides in after one's death or disguise as neighbours, the most unfavorable to it before trailing the door of resident family the most always.
Summary of the invention
The technical problem to be solved is to provide a kind of new Intelligent region monitoring method.
Technical scheme is as follows: a kind of Intelligent region monitoring method, and it comprises the following steps:
S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;
S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;
S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;
S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;
According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step, otherwise send illegal identity alarm;
S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.
Preferably, in step S2, use and the legal identity alignments that prestores carries out recognition of face.
Preferably, use and time the legal identity alignments that prestores carries out recognition of face, according to the details sign in described personnel's image, with the legal identity comparison one by one that prestores.
Preferably, described details sign is head feature.
Preferably, pass through with arbitrary legal identity comparison that prestores, then face recognition result is that the personnel corresponding to described personnel's image have legal identity.
Preferably, legal identity comparison is not all passed through with all prestoring, then face recognition result is that the personnel corresponding to described personnel's image do not have legal identity.
Preferably, described face recognition result is also stored.
Preferably, when the personnel amount corresponding to described personnel's image is more than one, carry out recognition of face with the legal identity alignments that prestores one by one.
Preferably, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein there is the number of legal identity more than 1, then continue executing with subsequent step.
Preferably, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing.
Using such scheme, the present invention arranges monitoring region by classification, and the personnel that have employed face recognition technology judge, it is possible to achieve validated user and the judgement of disabled user, no matter hides or pretends can find tailer in time and effectively;Automatic door opening is achieved for validated user, the most intelligent and convenient, it is particularly suitable for the two full resident families of hands.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of one embodiment of the invention.
Detailed description of the invention
For the ease of understanding the present invention, below in conjunction with the accompanying drawings and specific embodiment, the present invention will be described in more detail.This specification and accompanying drawing thereof give the preferred embodiment of the present invention, but, the present invention may utilize various forms and realizes, however it is not limited to the embodiment described by this specification.On the contrary, providing the purpose of these embodiments is to make the understanding to the disclosure more thorough comprehensively.
It should be noted that when a certain element is fixed on another element, including this element being directly fixed on this another element, or this element is fixed on this another element by least one other element placed in the middle.When an element connects another element, including this element being directly connected to this another element, or this element is connected to this another element by least one other element placed in the middle.
As it is shown in figure 1, the present invention example is, a kind of Intelligent region monitors method, and it comprises the following steps: step S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when there is not personnel's image, then subsequent step it is performed without;S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when the personnel corresponding to described personnel's image are introduced into described second monitoring region, then subsequent step it is performed without;According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step;Such as, illegal identity alarm is otherwise sent;That is, when the personnel corresponding to described personnel's image have legal identity, then subsequent step is continued executing with, it is not necessary to send illegal identity alarm;When personnel corresponding to described personnel's image do not have legal identity, then send illegal identity alarm;Wherein, described in send illegal identity alarm, including manager or resident family being sent illegal identity alarm, or send illegal identity alarm to default management terminal, or send illegal identity alarm to alarm center or area under one's jurisdiction local police station, or send alarm sound etc.;And for example, otherwise send illegal identity alarm, and abandon performing subsequent step;After i.e. sending illegal identity alarm, no longer perform subsequent step, such as, no longer perform step S5;S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.Such as, it is, sends and trail alarm, i.e. judge whether described first monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening;And for example, otherwise automatic door opening record enabling information;That is, it is judged that whether described first monitoring data exist the personnel of trailing, it is to send and trail alarm, otherwise automatic door opening record enabling information;Wherein, described in send and trail alarm and include manager or resident family are sent trailing alarm, or send to default management terminal and trail alarm, or send to alarm center or area under one's jurisdiction local police station and trail alarm, or send alarm sound etc..
Such as, in step S0, pre-set the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;Such as, centered by certain house or building, the scope outside the first monitoring region is radius 10 meters or 20 meters and within 100 meters, the second monitoring region is the scope within radius 10 meters or 20 meters.And for example, centered by door or gate, the second monitoring region is outside it and scope within radius 10 meters or 20 meters, the scope outside the first monitoring region is radius 10 meters or 20 meters and within 100 meters.And for example, outside community or community or specific region, some scopes are the first monitoring region, and such as these some scopes determine according to the ability of monitoring device, for example, the monitoring radius of the photographic head of monitoring device;The big outer side of door in house is the second monitoring region, after i.e. entering community or community or specific region, until house is big outdoors, is the second monitoring region.By that analogy.So, monitoring region is set by classification, validated user, general population can be distinguished targetedly and trail personnel etc., carry out follow-up effective differentiation and reply.
Such as, in step S0, described first monitoring region partially overlaps setting with described second monitoring region;And for example, in step S0, described first monitoring region is disposed adjacent with described second monitoring region.Preferably, in step S0, described first monitoring region is disposed adjacent with described second monitoring region and partially overlaps.This way it is possible to avoid the existence at monitoring dead angle, strengthen the effectiveness of monitoring.
Such as, in step S0, pre-set the first monitoring region and some first monitoring devices thereof, with the second monitoring region and some second monitoring devices thereof, such as, some first monitoring devices are arranged for described first monitoring region, some second monitoring devices are arranged for described second monitoring region, each monitoring device, including each first monitoring device and each second monitoring device, it is connected respectively to a monitoring server, unification collects monitoring data, described supervision packet includes the first monitoring data of each first monitoring device and the second monitoring data of each second monitoring device, or can be understood as, described supervision packet includes the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region.Preferably, each monitoring device is provided with mounting seat and is rotatably installed in the photographic head in described mounting seat, preferably, the built-in communicator of described mounting seat, controller and driver, described communicator is connected with described driver by described controller, for receiving the control instruction of described monitoring server, described controller controls photographic head described in described driver drives and rotates, such as, rotate along with the movement of monitored object;Further, described communicator is also connected with described photographic head, for receiving the camera data of described photographic head, as described monitoring data, and is sent to described monitoring server.Preferably, described communicator and described monitoring server wireless connections.As such, it is possible to conveniently realize data communication, upload monitoring data and issue control instruction.And for example, arranging solaode outside described mounting seat, it connects the accumulator that described mounting seat is built-in, for powering with described driver for described communicator, described controller.
Such as, in step S1, obtain the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;Such as, wireless communication mode is used to obtain the first monitoring data and the second monitoring data in described second monitoring region, the most described monitoring data in described first monitoring region.And for example, the described first monitoring data of wireless acquisition and described second monitor data respectively;And for example, the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region are automatically obtained;And for example, self-timing obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;And for example, the cycle obtains described first monitoring data and described second monitoring data;And for example, automatic cycle obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;And for example, described first monitoring data and described second monitoring data are obtained in real time;And for example, the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region are obtained the most in real time;And for example, synchronize to obtain described first monitoring data and described second monitoring data.
Preferably, step S1 comprises the following steps: obtain described first monitoring data, it may be judged whether change, be, obtains described second monitoring data.Such as, it is to start described second monitoring device, obtains described second monitoring data.And for example, otherwise abandon obtaining described second monitoring data.That is, step S1 comprises the following steps: obtain described first monitoring data, it may be judged whether change, be, start described second monitoring device, obtains described second monitoring data, otherwise abandons obtaining described second monitoring data.So, under safe condition, it is not necessary to start described second monitoring device, such that it is able to energy efficient.Preferably, described first monitoring data are obtained, it may be judged whether change, use following steps to realize: two frame data before and after sequentially in the first monitoring data described in comparison, it may be judged whether change.Such as, two frame data before and after frame by frame in the first monitoring data described in comparison, it may be judged whether change.It is to say, each frame is all compared with previous frame, as such, it is possible to the very first time finds whether change occurs, such as, many people on picture.Preferably, when the biochron occurs, it is determined that change.Such that making is that a vagrant dog comes in, discovery also can be monitored in time.
Preferably, after step S1, before step S2, further comprise the steps of: according to described first monitoring data and described second monitoring data, it may be judged whether occur abnormal, be to report to the police, upload abnormal image or anomalous video;Preferably, also start the precautionary measures, such as automatic door-closing, automatically lock a door, automatic window-closing, automatically lock window, automatically fall fence etc., to strengthen community and house security.Such as, breaking out of fire etc., then judge to occur extremely, and report to the police, upload abnormal image or anomalous video as warning evidence.And for example, after step S1, before step S2, further comprise the steps of: according to described first monitoring data and described second monitoring data, it may be judged whether activate pre-conditioned, be, start the precautionary measures, such as automatic door-closing, automatically lock a door, automatic window-closing, automatically lock window, automatically fall fence etc..Such as, when raining, automatic window-closing.And for example, have unidentified personage near time, automatically lock a door.
Such as, in step S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when there is not personnel's image, then subsequent step it is performed without.
Preferably, in step S2, judge whether personnel's image according to default sign;Such as, described default sign includes head sign, trunk sign and extremity sign;Preferably, the sign that walks upright also is included.Such as, when occurring one, there is head, trunk and extremity and upright walking biochron, then it is determined that the presence of personnel's image.Preferably, described default sign also includes medicated clothing feature, such as, when cold snap is wrapped up in the most tight, can judge whether personnel's image by medicated clothing feature;Preferably, described default sign also includes ability to act feature, such as, a biology walking upright and being moved in urban district, the most substantially can determine that and there is personnel's image.
Such as, judge whether personnel's image according to default sign, be, carry out recognition of face according to described personnel's image.Such as, recognition of face is carried out according to the details sign in described personnel's image.Such as, described details sign includes that eyes sign, nose sign gill lobe are levied, and recognizes described personnel's image by eyes, nose and ear and distinguishes the most different personnel.Preferably, described details sign also includes hair sign;And/or, described details sign also includes cervical region sign;And/or, described details sign also includes colour of skin sign;And/or, described details sign also includes stature sign.So, recognized by details, recognition of face can be carried out, thus assert validated user, and can greatly reduce error.
Preferably, in step S2, use and the legal identity alignments that prestores carries out recognition of face.Such as, prestore in system some legal identities, and such as, prestore in monitoring server some legal identities, and such as, legal identity is legal resident family or the legal resident family of certain community in certain house, and such as, it prestores head portrait in monitoring server;And for example, contact method is also prestored in monitoring server.Such as, using and time the legal identity alignments that prestores carries out recognition of face, according to the details sign in described personnel's image, and the legal identity comparison one by one that prestores, to judge whether the personnel corresponding to described personnel's image have legal identity.Preferably, described details sign is head feature, and such as, described details sign is same as above.
Such as, when employing carries out recognition of face with the legal identity alignments that prestores, according to the details sign in described personnel's image, with the legal identity comparison one by one that prestores, pass through with arbitrary legal identity comparison that prestores, then face recognition result is that the personnel corresponding to described personnel's image have legal identity.And for example, legal identity comparison is not all passed through with all prestoring, then face recognition result is that the personnel corresponding to described personnel's image do not have legal identity.As such, it is possible to automatically confirm that whether personnel corresponding in described personnel's image have legal identity easily, it is not necessary to manual operation, it is achieved simple, convenient.
Preferably, described face recognition result is also stored.Such as, regardless of whether comparison is passed through, all store described face recognition result.Such as, store described face recognition result in chronological order in FIFO mode, monitor information in a large number as such, it is possible to provide for security protection.Preferably, also store described personnel's image and the sign of corresponding personnel thereof, including head sign, face sign, trunk sign, extremity sign and garment ornament etc..
And for example, when the personnel amount corresponding to described personnel's image is more than one, carry out recognition of face with the legal identity alignments that prestores one by one.Such as, using and carry out recognition of face one by one with the legal identity alignments that prestores, so, when there being many individuals to enter the first monitoring region simultaneously or successively, everyone will carry out comparison one by one with the legal identity that prestores, carry out recognition of face.Preferably, the sign of these people is also stored.Such as, the cycle that further comprises the steps of: obtains defences wanted circular convict's information jointly, set up wanted criminal people's identity database, and when carrying out recognition of face, also with the comparison one by one of wanted criminal people's identity database, when passing through with arbitrary wanted circular convict's information comparison, then face recognition result is that the personnel corresponding to described personnel's image have wanted circular identity, performs urgent counter-measure;Such as, described urgent counter-measure includes warning, tissue defence strength, notifies householder or management personnel etc..So operation, there is fabulous security protection effect, substantially eliminating the generation of the potential case, offender dare not be entered, also allow for household or community defences jointly, such as at the photo of monitoring server automatic down loading updating Ministry of Public Security wanted criminal, when major case is violated or recidivist enters monitoring region, and alarm.
Such as, in step S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when the personnel corresponding to described personnel's image are introduced into described second monitoring region, then subsequent step it is performed without.
Preferably, in step S0, pre-set some described first monitoring devices and some described second monitoring devices.Preferably, each described first monitoring device rotates and arranges;And/or, each described second monitoring device rotates and arranges.Preferably, in step S2, carry out recognition of face from multi-angle.Such as, in step S2, when judging to there is personnel's image, quantity always according to personnel's image drives each described first monitoring device to rotate, so that personnel's at least the first servo-actuated monitoring of monitoring device described in corresponding to each described personnel's image, i.e. rotate along with the movement of the personnel corresponding to described personnel's image, leave the monitoring range of the first monitoring device until its this, preferably, now another first monitoring device continues to rotate the movement of the personnel corresponding to described personnel's image.As such, it is possible to obtain preferable monitoring effect.Preferably, in step S3, continue to carry out recognition of face from multi-angle, to judge whether the personnel corresponding to described personnel's image enter described second monitoring region;Or, in order to simplify program, in step S3, without carrying out recognition of face, continue to be monitored from multi-angle, and drive each described second monitoring device to rotate according to the quantity of personnel's image, so that at least the second servo-actuated monitoring of monitoring device described in of the personnel corresponding to each described personnel's image.
Preferably, in step S3, according to the personnel amount corresponding to described personnel's image, it may be judged whether there is at least one people and enter described second monitoring region.That is, the personnel corresponding to described personnel's image of described first monitoring data, can be change, when the described first some people monitoring data disappears, and when being introduced into described second monitoring region, then judge that it leaves monitoring region, without comprehending, when the described first some people monitoring data disappears, and when entering described second monitoring region, then judge whether that at least one people enters described second monitoring region, need to pay close attention to.
Preferably, in step S2, it is judged that when there is personnel's image, then each independent persons designer's labelling corresponding to described personnel's image.Under normal circumstances, this number will not be the highest, and such as, worker labels is three bit digital or 4 bit digital, wherein can arrange flag, and such as, it is fat or thin etc. that flag is used for indicating men and women, old and young's height.Preferably, in step S3, according to the worker labels of each independent persons corresponding to described personnel's image, it is judged that whether it enters described second monitoring region;Once enter, then key monitoring.Preferably, for each independent persons corresponding to described personnel's image, it is its designer's labelling according to its appearance order.And/or, for each independent persons corresponding to described personnel's image, it is its designer's labelling according to its personal feature.Such as, worker labels includes time of occurrence and personal feature, uses numeral to represent, such as, 201511110123888888, wherein, 201511110123 is time of occurrence, and 888888 is 6 personal features, specifically can arrange by actual demand;Such as, personal feature includes figure feature.Such as, described figure feature includes above-mentioned sign;Such as, described figure feature includes head sign, trunk sign or extremity sign.Preferably, described figure feature also includes details sign, and such as, described figure feature includes above-mentioned details sign.Preferably, described personal feature also includes wearing feature, such as, and the color of clothes, style, if be branded as, by crutch etc..As such, it is possible to be monitored easily and record.
Such as, in step S4, judge whether the personnel corresponding to described personnel's image have legal identity according to face recognition result, be to continue executing with subsequent step;Such as, illegal identity alarm is otherwise sent;That is, when the personnel corresponding to described personnel's image have legal identity, then subsequent step is continued executing with, it is not necessary to send illegal identity alarm;When personnel corresponding to described personnel's image do not have legal identity, then send illegal identity alarm.And for example, otherwise send illegal identity alarm, and abandon performing subsequent step;After i.e. sending illegal identity alarm, no longer perform subsequent step, such as, no longer perform step S5.
Preferably, in step S4, judge whether the full complement corresponding to described personnel's image has legal identity according to face recognition result.Or, in step S4, judge whether the arbitrary personnel corresponding to described personnel's image have legal identity according to face recognition result.
Preferably, send illegal identity alarm, including the information that sends to default monitor terminal.Preferably, when sending illegal identity alarm, also control described default monitor terminal and give a warning voice prompt.Such as, default monitor terminal includes resident family's mobile phone, manager's mobile phone, locality-police's mobile phone and/or area under one's jurisdiction local police station monitor terminal etc., send illegal identity alarm, including the information that sends to resident family's mobile phone, manager's mobile phone, locality-police's mobile phone and/or area under one's jurisdiction local police station monitor terminal etc..Preferably, send illegal identity alarm, also include that the information that sends is to default monitoring display screen.Such as, the information that sends presets monitoring display screen to community or area under one's jurisdiction local police station presets monitoring display screen.Preferably, sending illegal identity alarm, also include the sound that gives a warning, such as, " constituent parts notes, finds unidentified personnel, alarms ", can play certain effect of intimidateing, the prevention case occurs.Preferably, when sending illegal identity alarm, store the described first monitoring data of correspondence and described second monitoring data the most respectively.Such as, after the described first monitoring data of storage correspondence and described second monitoring data, it is also transmitted to preset monitor terminal.Preferably, when sending illegal identity alarm, also start high-definition monitoring equipment, servo-actuated acquisition high-definition monitoring data;As such, it is possible to provide evidence clearly, it is particularly suitable for monitoring and security protection.
Such as, in step S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.Such as, it is, sends and trail alarm, i.e. judge whether described first monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening.And for example, otherwise automatic door opening record enabling information;That is, it is judged that whether described first monitoring data exist the personnel of trailing, it is to send and trail alarm, otherwise automatic door opening record enabling information.Such as, described enabling information includes opening time, enabling object, monitoring image or video etc..Preferably, in step S5, automatic door opening after recording enabling information, also send described enabling information to default monitor terminal.So, monitor terminal is preset it is known that the most why people has opened door.
Preferably, in step S5, before automatic door opening, also judge whether described second monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening.Such as, step S5 comprises the following steps: judge whether described first monitoring data and described second monitoring data exist the personnel of trailing respectively, and arbitrary judged result is yes, then send and trail alarm, otherwise automatic door opening record enabling information.
Preferably, send and trail alarm, including the information that sends to default monitor terminal.Preferably, send when trailing alarm, also send and trail alarm signal to default police reporting center.Preferably, described default monitor terminal send and trail alarm signal to described default police reporting center.As such, it is possible to and alarm, send help signal.Preferably, send and trail alarm, also include that the information that sends is to default monitoring display screen.Such as, also the most described first monitoring data are shown at described default monitoring display screen;And/or, also show the most described second monitoring data at described default monitoring display screen.As such, it is possible to offer relevant evidence.
Preferably, sending and trail alarm, also include the contact details that prestore corresponding to described personnel's image with the personnel of legal identity, automatically dial its phone, prompting has people to trail;So, the personnel with legal identity trailed, it is possible to be notified in time, take the precautionary measures, such as, turn to the safety zone such as administrative office or room security, and personal safety and the family's property safety of the personnel with legal identity that trailed have been significantly greatly increased.And for example, use joint prevention and control mode, send and trail alarm, also include that the community personnel helped each other to neighbourhood or next door resident family send help signal, or send joint defence sound in community, thus be prevented effectively from the case and occur, ensure the safety of the personnel with legal identity.
Preferably, in step S0, also set up zone of protection and protecting, monitoring equipment thereof and protective door;Described zone of protection is disposed adjacent with described second monitoring region, and described second monitoring region monitors between region and described zone of protection described first;In step S5, judge when personnel are trailed in described first monitoring data existence, obtain the protecting, monitoring data of described zone of protection, determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door.Preferably, described protective door is arranged between described zone of protection and described second monitoring region.So; there is the user of legal identity in any case; Additional Protection can be obtained; such as, some unit one zone of protection of composition of same floor, these unit are externally unified arranges same protective door; when the personnel with legal identity enter described zone of protection and the personnel that trail are introduced into described zone of protection; then close described protective door, will trail outside personnel are isolated from, using the teaching of the invention it is possible to provide many one layer of physics guarantees.Such as, skyscraper is H type structure, elevator is in horizontal line position, the resident family with legal identity finds the person of harboring evil designs when elevator, resident family proceeds to rapidly vertical line position after going out elevator, the person that now do not harbors evil designs presses hard the most step by step and goes slowly in horizontal line position, within protective door is arranged on horizontal line position and intersection, vertical line position or vertical line position, now determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door, there are the personnel of legal identity from infringement with protection, the incidence rate into room homicide case can also be prevented to a certain extent.
Preferably, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein there is the number of legal identity more than 1, then continue executing with subsequent step.Such as, a legal resident family can carry a little relatives and friends to come in;Preferably, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing;And for example, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing, otherwise report to the police or notify manager or send notification to the personnel with legal identity.The most described security implications is a v-sign or an OK gesture etc..So, if legal resident family, i.e. there are the personnel corresponding to described personnel's image of legal identity, be affected by coercing, as long as he does not send security implications, or give the security implications made mistake, the most automatically report to the police.Preferably, corresponding first monitoring data and/or the second monitoring data are also sent during warning, to provide evidence.And for example, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein everyone is respectively provided with legal identity, then subsequent step is continued executing with.So, a legal resident family just must can carry a little relatives and friends to come in after registration.
Further, embodiments of the invention also include, each technical characteristic of the various embodiments described above, are mutually combined the Intelligent region monitoring method of formation.
It should be noted that above-mentioned each technical characteristic continues to be mutually combined, form various embodiments the most enumerated above, be accordingly to be regarded as the scope that description of the invention is recorded;Further, for those of ordinary skills, can be improved according to the above description or be converted, and all these modifications and variations all should be belonged to the protection domain of claims of the present invention.

Claims (10)

1. an Intelligent region monitoring method, it is characterised in that comprise the following steps:
S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;
S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;
S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;
S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;
According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step, otherwise send illegal identity alarm;
S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.
Intelligent region monitoring method the most according to claim 1, it is characterised in that in step S2, use and the legal identity alignments that prestores carries out recognition of face.
Intelligent region monitoring method the most according to claim 2, it is characterised in that use and time the legal identity alignments that prestores carries out recognition of face, according to the details sign in described personnel's image, with the legal identity comparison one by one that prestores.
Intelligent region monitoring method the most according to claim 3, it is characterised in that described details sign is head feature.
Intelligent region monitoring method the most according to claim 3, it is characterised in that pass through with arbitrary legal identity comparison that prestores, then face recognition result is that the personnel corresponding to described personnel's image have legal identity.
Intelligent region monitoring method the most according to claim 4, it is characterised in that legal identity comparison is not all passed through with all prestoring, then face recognition result is that the personnel corresponding to described personnel's image do not have legal identity.
Intelligent region monitoring method the most according to claim 5, it is characterised in that also store described face recognition result.
Intelligent region monitoring method the most according to claim 2, it is characterised in that when the personnel amount corresponding to described personnel's image is more than one, carry out recognition of face with the legal identity alignments that prestores one by one.
Intelligent region monitoring method the most according to claim 8, it is characterised in that when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein there is the number of legal identity more than 1, then continue executing with subsequent step.
The most according to claim 9, Intelligent region monitoring method, it is characterised in that in step S5, also judge whether the personnel with legal identity provide security implications, be, judges that described first monitoring data do not exist the personnel of trailing.
CN201510949035.4A 2015-12-18 2015-12-18 Intelligent area monitoring method Pending CN105931316A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510949035.4A CN105931316A (en) 2015-12-18 2015-12-18 Intelligent area monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510949035.4A CN105931316A (en) 2015-12-18 2015-12-18 Intelligent area monitoring method

Publications (1)

Publication Number Publication Date
CN105931316A true CN105931316A (en) 2016-09-07

Family

ID=56840354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510949035.4A Pending CN105931316A (en) 2015-12-18 2015-12-18 Intelligent area monitoring method

Country Status (1)

Country Link
CN (1) CN105931316A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399674A (en) * 2018-05-09 2018-08-14 苏州七巧板日用品科技有限公司 A kind of intelligent safety door
CN109671200A (en) * 2019-01-12 2019-04-23 深圳旦倍科技有限公司 Fingerprint identification door lock system based on Internet of Things
CN109726656A (en) * 2018-12-18 2019-05-07 广东中安金狮科创有限公司 Monitoring device and its trailing monitoring method, device, readable storage medium storing program for executing
CN110147916A (en) * 2018-06-19 2019-08-20 浙江大学山东工业技术研究院 A kind of coal mine personnel schedule management method
CN110189450A (en) * 2019-06-05 2019-08-30 厦门浩邈科技有限公司 A kind of trailing analysis method based on recognition of face and demographics
CN110491004A (en) * 2019-08-14 2019-11-22 金陵科技学院 A kind of residential communities personnel security management system and method
CN111243247A (en) * 2020-01-07 2020-06-05 深圳数位传媒科技有限公司 Alarm method and device for area monitoring
CN112017345A (en) * 2020-08-21 2020-12-01 中建二局第一建筑工程有限公司 Intelligent access control security method, device and system and storage medium
CN113628372A (en) * 2021-08-18 2021-11-09 中铁第一勘察设计院集团有限公司 Full-automatic operation protective area SPKS and entrance guard interlocking management system for rail transit

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102137251A (en) * 2010-01-22 2011-07-27 鸿富锦精密工业(深圳)有限公司 Image monitoring system and method
CN102521619A (en) * 2011-11-22 2012-06-27 汉王科技股份有限公司 Information presentation method and device based on face recognition and face recognition printing system
CN102622579A (en) * 2012-02-20 2012-08-01 华焦宝 Face early warning method and system
CN103236103A (en) * 2013-05-14 2013-08-07 苏州福丰科技有限公司 Anti-follow access control system based on face recognition
CN103400108A (en) * 2013-07-10 2013-11-20 北京小米科技有限责任公司 Face identification method and device as well as mobile terminal
CN104581035A (en) * 2013-10-29 2015-04-29 中国电信股份有限公司 Video surveillance management method and device for protecting privacy
CN104715245A (en) * 2015-04-02 2015-06-17 中国民用航空局信息中心 Method and device for monitoring airport staff

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102137251A (en) * 2010-01-22 2011-07-27 鸿富锦精密工业(深圳)有限公司 Image monitoring system and method
CN102521619A (en) * 2011-11-22 2012-06-27 汉王科技股份有限公司 Information presentation method and device based on face recognition and face recognition printing system
CN102622579A (en) * 2012-02-20 2012-08-01 华焦宝 Face early warning method and system
CN103236103A (en) * 2013-05-14 2013-08-07 苏州福丰科技有限公司 Anti-follow access control system based on face recognition
CN103400108A (en) * 2013-07-10 2013-11-20 北京小米科技有限责任公司 Face identification method and device as well as mobile terminal
CN104581035A (en) * 2013-10-29 2015-04-29 中国电信股份有限公司 Video surveillance management method and device for protecting privacy
CN104715245A (en) * 2015-04-02 2015-06-17 中国民用航空局信息中心 Method and device for monitoring airport staff

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399674A (en) * 2018-05-09 2018-08-14 苏州七巧板日用品科技有限公司 A kind of intelligent safety door
CN110147916A (en) * 2018-06-19 2019-08-20 浙江大学山东工业技术研究院 A kind of coal mine personnel schedule management method
CN109726656A (en) * 2018-12-18 2019-05-07 广东中安金狮科创有限公司 Monitoring device and its trailing monitoring method, device, readable storage medium storing program for executing
CN109671200A (en) * 2019-01-12 2019-04-23 深圳旦倍科技有限公司 Fingerprint identification door lock system based on Internet of Things
CN110189450A (en) * 2019-06-05 2019-08-30 厦门浩邈科技有限公司 A kind of trailing analysis method based on recognition of face and demographics
CN110491004A (en) * 2019-08-14 2019-11-22 金陵科技学院 A kind of residential communities personnel security management system and method
CN110491004B (en) * 2019-08-14 2021-06-25 金陵科技学院 Resident community personnel safety management system and method
CN111243247A (en) * 2020-01-07 2020-06-05 深圳数位传媒科技有限公司 Alarm method and device for area monitoring
CN112017345A (en) * 2020-08-21 2020-12-01 中建二局第一建筑工程有限公司 Intelligent access control security method, device and system and storage medium
CN113628372A (en) * 2021-08-18 2021-11-09 中铁第一勘察设计院集团有限公司 Full-automatic operation protective area SPKS and entrance guard interlocking management system for rail transit

Similar Documents

Publication Publication Date Title
CN105931316A (en) Intelligent area monitoring method
CN105957286A (en) Intelligent community safety method
CN105929696A (en) Intelligent home security method
US20230351872A1 (en) Video monitoring and alarm verification technology
US20210144261A1 (en) Doorbell call center
US10223888B2 (en) Personnel authentication and tracking system
JP6608911B2 (en) Door and home security system and method
CN108412315B (en) Intelligent door lock warning system and control method thereof
CN202976256U (en) Intelligent entrance guard control system
CN105931405A (en) Intelligent area security method
CN205788358U (en) Work attendance gate control system
EP3224816B1 (en) Home security system
WO2018232922A1 (en) Home security method and system
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
CN205656683U (en) Unmanned on duty supermarket entrance guard's device
CN106285418A (en) Intelligent household-entry safety door system
CN111784889A (en) Access control management system
CN105991975A (en) Intelligent multilevel security monitoring method
CN105989685A (en) Intelligent community monitoring management method
CN208433076U (en) Safety precaution and emergency commading system and wisdom prison system
CN105933643A (en) Intelligent home monitoring method
CN107341940A (en) A kind of safety monitoring system and monitoring method
CN105701741A (en) Hotel security protection system
CN206788888U (en) A kind of new A TM recognition of face guard systems
CN105264483A (en) Web portal for managing premise security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160907

RJ01 Rejection of invention patent application after publication