CN105989685A - Intelligent community monitoring management method - Google Patents
Intelligent community monitoring management method Download PDFInfo
- Publication number
- CN105989685A CN105989685A CN201510949022.7A CN201510949022A CN105989685A CN 105989685 A CN105989685 A CN 105989685A CN 201510949022 A CN201510949022 A CN 201510949022A CN 105989685 A CN105989685 A CN 105989685A
- Authority
- CN
- China
- Prior art keywords
- monitoring
- personnel
- monitoring data
- image
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides an intelligent community monitoring management method comprising the steps that a first monitoring area and first monitoring equipment thereof and a second monitoring area and second monitoring equipment thereof are preset; the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area are acquired; existence of a personnel image is judged according to the first monitoring data, face recognition is performed if the judgment result is yes and the subsequent steps are continued, or performing of the subsequent steps is abandoned; whether a corresponding personnel according to the personnel image enters the second monitoring area is judged, the subsequent steps are continued if the judgment result is yes, or performing of the subsequent steps is abandoned; whether the corresponding personnel of the personnel image has legal identity is judged according to the face recognition result, the subsequent steps are continued if the judgment result is yes, or illegal identity alarming is performed and performing of the subsequent steps is abandoned; and existence of following personnel in the first monitoring data is judged, following alarming is performed if the judgment result is yes, or the door opens automatically.
Description
Technical field
The present invention relates to Smart Home, intelligent monitoring and intelligent security guard system, in particular, a kind of Intelligent Community method for managing and monitoring.
Background technology
Existing household or Community Watch and security protection, realize often through photographic head, such as, a photographic head is being set in front of the door, but, photographic head often can only monitor a small region, the resident family the biggest one section of region before door does not ensure, also cannot take precautions against tailer, especially malice tailer, hide in after one's death or disguise as neighbours, the most unfavorable to it before trailing the door of resident family the most always.
Summary of the invention
The technical problem to be solved is to provide a kind of new Intelligent Community method for managing and monitoring.
Technical scheme is as follows: a kind of Intelligent Community method for managing and monitoring, and it comprises the following steps: S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step, otherwise send illegal identity alarm, and abandon performing subsequent step;S5, it is judged that whether described first monitoring data exist the personnel of trailing, and are to send and trail alarm, otherwise automatic door opening.
Preferably, in step S4, judge whether the full complement corresponding to described personnel's image has legal identity according to face recognition result.
Preferably, in step S4, judge whether the arbitrary personnel corresponding to described personnel's image have legal identity according to face recognition result.
Preferably, send illegal identity alarm, including the information that sends to default monitor terminal.
Preferably, when sending illegal identity alarm, also control described default monitor terminal and give a warning voice prompt.
Preferably, send illegal identity alarm, also include that the information that sends is to default monitoring display screen.
Preferably, send illegal identity alarm, also include the sound that gives a warning.
Preferably, when sending illegal identity alarm, store the described first monitoring data of correspondence and described second monitoring data the most respectively.
Preferably, after the described first monitoring data of storage correspondence and described second monitoring data, it is also transmitted to preset monitor terminal.
Preferably, when sending illegal identity alarm, also start high-definition monitoring equipment, servo-actuated acquisition high-definition monitoring data.
Using such scheme, the present invention arranges monitoring region by classification, and the personnel that have employed face recognition technology judge, it is possible to achieve validated user and the judgement of disabled user, no matter hides or pretends can find tailer in time and effectively;Automatic door opening is achieved for validated user, the most intelligent and convenient, it is particularly suitable for the two full resident families of hands.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of one embodiment of the invention.
Detailed description of the invention
For the ease of understanding the present invention, below in conjunction with the accompanying drawings and specific embodiment, the present invention will be described in more detail.This specification and accompanying drawing thereof give the preferred embodiment of the present invention, but, the present invention may utilize various forms and realizes, however it is not limited to the embodiment described by this specification.On the contrary, providing the purpose of these embodiments is to make the understanding to the disclosure more thorough comprehensively.
It should be noted that when a certain element is fixed on another element, including this element being directly fixed on this another element, or this element is fixed on this another element by least one other element placed in the middle.When an element connects another element, including this element being directly connected to this another element, or this element is connected to this another element by least one other element placed in the middle.
As it is shown in figure 1, the present invention example is, a kind of Intelligent Community method for managing and monitoring, it comprises the following steps: step S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when there is not personnel's image, then subsequent step it is performed without;S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when the personnel corresponding to described personnel's image are introduced into described second monitoring region, then subsequent step it is performed without;According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step;Such as, illegal identity alarm is otherwise sent;That is, when the personnel corresponding to described personnel's image have legal identity, then subsequent step is continued executing with, it is not necessary to send illegal identity alarm;When personnel corresponding to described personnel's image do not have legal identity, then send illegal identity alarm;Wherein, described in send illegal identity alarm, including manager or resident family being sent illegal identity alarm, or send illegal identity alarm to default management terminal, or send illegal identity alarm to alarm center or area under one's jurisdiction local police station, or send alarm sound etc.;And for example, otherwise send illegal identity alarm, and abandon performing subsequent step;After i.e. sending illegal identity alarm, no longer perform subsequent step, such as, no longer perform step S5;S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.Such as, it is, sends and trail alarm, i.e. judge whether described first monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening;And for example, otherwise automatic door opening record enabling information;That is, it is judged that whether described first monitoring data exist the personnel of trailing, it is to send and trail alarm, otherwise automatic door opening record enabling information;Wherein, described in send and trail alarm and include manager or resident family are sent trailing alarm, or send to default management terminal and trail alarm, or send to alarm center or area under one's jurisdiction local police station and trail alarm, or send alarm sound etc..
Such as, in step S0, pre-set the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;Such as, centered by certain house or building, the scope outside the first monitoring region is radius 10 meters or 20 meters and within 100 meters, the second monitoring region is the scope within radius 10 meters or 20 meters.And for example, centered by door or gate, the second monitoring region is outside it and scope within radius 10 meters or 20 meters, the scope outside the first monitoring region is radius 10 meters or 20 meters and within 100 meters.And for example, outside community or community or specific region, some scopes are the first monitoring region, and such as these some scopes determine according to the ability of monitoring device, for example, the monitoring radius of the photographic head of monitoring device;And for example, community is a residential quarter or a block etc.;The big outer side of door in house is the second monitoring region, after i.e. entering community or community or specific region, until house is big outdoors, is the second monitoring region.By that analogy.So, monitoring region is set by classification, validated user, general population can be distinguished targetedly and trail personnel etc., carry out follow-up effective differentiation and reply.
Such as, in step S0, described first monitoring region partially overlaps setting with described second monitoring region;And for example, in step S0, described first monitoring region is disposed adjacent with described second monitoring region.Preferably, in step S0, described first monitoring region is disposed adjacent with described second monitoring region and partially overlaps.This way it is possible to avoid the existence at monitoring dead angle, strengthen the effectiveness of monitoring.
Such as, in step S0, pre-set the first monitoring region and some first monitoring devices thereof, with the second monitoring region and some second monitoring devices thereof, such as, some first monitoring devices are arranged for described first monitoring region, some second monitoring devices are arranged for described second monitoring region, each monitoring device, including each first monitoring device and each second monitoring device, it is connected respectively to a monitoring server, unification collects monitoring data, described supervision packet includes the first monitoring data of each first monitoring device and the second monitoring data of each second monitoring device, or can be understood as, described supervision packet includes the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region.Preferably, each monitoring device is provided with mounting seat and is rotatably installed in the photographic head in described mounting seat, preferably, the built-in communicator of described mounting seat, controller and driver, described communicator is connected with described driver by described controller, for receiving the control instruction of described monitoring server, described controller controls photographic head described in described driver drives and rotates, such as, rotate along with the movement of monitored object;Further, described communicator is also connected with described photographic head, for receiving the camera data of described photographic head, as described monitoring data, and is sent to described monitoring server.Preferably, described communicator and described monitoring server wireless connections.As such, it is possible to conveniently realize data communication, upload monitoring data and issue control instruction.And for example, arranging solaode outside described mounting seat, it connects the accumulator that described mounting seat is built-in, for powering with described driver for described communicator, described controller.
Such as, in step S1, obtain the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;Such as, wireless communication mode is used to obtain the first monitoring data and the second monitoring data in described second monitoring region, the most described monitoring data in described first monitoring region.And for example, the described first monitoring data of wireless acquisition and described second monitor data respectively;And for example, the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region are automatically obtained;And for example, self-timing obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;And for example, the cycle obtains described first monitoring data and described second monitoring data;And for example, automatic cycle obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;And for example, described first monitoring data and described second monitoring data are obtained in real time;And for example, the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region are obtained the most in real time;And for example, synchronize to obtain described first monitoring data and described second monitoring data.
Preferably, step S1 comprises the following steps: obtain described first monitoring data, it may be judged whether change, be, obtains described second monitoring data.Such as, it is to start described second monitoring device, obtains described second monitoring data.And for example, otherwise abandon obtaining described second monitoring data.That is, step S1 comprises the following steps: obtain described first monitoring data, it may be judged whether change, be, start described second monitoring device, obtains described second monitoring data, otherwise abandons obtaining described second monitoring data.So, under safe condition, it is not necessary to start described second monitoring device, such that it is able to energy efficient.Preferably, described first monitoring data are obtained, it may be judged whether change, use following steps to realize: two frame data before and after sequentially in the first monitoring data described in comparison, it may be judged whether change.Such as, two frame data before and after frame by frame in the first monitoring data described in comparison, it may be judged whether change.It is to say, each frame is all compared with previous frame, as such, it is possible to the very first time finds whether change occurs, such as, many people on picture.Preferably, when the biochron occurs, it is determined that change.Such that making is that a vagrant dog comes in, discovery also can be monitored in time.
Preferably, after step S1, before step S2, further comprise the steps of: according to described first monitoring data and described second monitoring data, it may be judged whether occur abnormal, be to report to the police, upload abnormal image or anomalous video;Preferably, also start the precautionary measures, such as automatic door-closing, automatically lock a door, automatic window-closing, automatically lock window, automatically fall fence etc., to strengthen community and house security.Such as, breaking out of fire etc., then judge to occur extremely, and report to the police, upload abnormal image or anomalous video as warning evidence.And for example, after step S1, before step S2, further comprise the steps of: according to described first monitoring data and described second monitoring data, it may be judged whether activate pre-conditioned, be, start the precautionary measures, such as automatic door-closing, automatically lock a door, automatic window-closing, automatically lock window, automatically fall fence etc..Such as, when raining, automatic window-closing.And for example, have unidentified personage near time, automatically lock a door.
Such as, in step S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when there is not personnel's image, then subsequent step it is performed without.
Preferably, in step S2, judge whether personnel's image according to default sign;Such as, described default sign includes head sign, trunk sign and extremity sign;Preferably, the sign that walks upright also is included.Such as, when occurring one, there is head, trunk and extremity and upright walking biochron, then it is determined that the presence of personnel's image.Preferably, described default sign also includes medicated clothing feature, such as, when cold snap is wrapped up in the most tight, can judge whether personnel's image by medicated clothing feature;Preferably, described default sign also includes ability to act feature, such as, a biology walking upright and being moved in urban district, the most substantially can determine that and there is personnel's image.
Such as, judge whether personnel's image according to default sign, be, carry out recognition of face according to described personnel's image.Such as, recognition of face is carried out according to the details sign in described personnel's image.Such as, described details sign includes that eyes sign, nose sign gill lobe are levied, and recognizes described personnel's image by eyes, nose and ear and distinguishes the most different personnel.Preferably, described details sign also includes hair sign;And/or, described details sign also includes cervical region sign;And/or, described details sign also includes colour of skin sign;And/or, described details sign also includes stature sign.So, recognized by details, recognition of face can be carried out, thus assert validated user, and can greatly reduce error.
Preferably, in step S2, use and the legal identity alignments that prestores carries out recognition of face.Such as, prestore in system some legal identities, and such as, prestore in monitoring server some legal identities, and such as, legal identity is legal resident family or the legal resident family of certain community in certain house, and such as, it prestores head portrait in monitoring server;And for example, contact method is also prestored in monitoring server.Such as, using and time the legal identity alignments that prestores carries out recognition of face, according to the details sign in described personnel's image, and the legal identity comparison one by one that prestores, to judge whether the personnel corresponding to described personnel's image have legal identity.Preferably, described details sign is head feature, and such as, described details sign is same as above.
Such as, when employing carries out recognition of face with the legal identity alignments that prestores, according to the details sign in described personnel's image, with the legal identity comparison one by one that prestores, pass through with arbitrary legal identity comparison that prestores, then face recognition result is that the personnel corresponding to described personnel's image have legal identity.And for example, legal identity comparison is not all passed through with all prestoring, then face recognition result is that the personnel corresponding to described personnel's image do not have legal identity.As such, it is possible to automatically confirm that whether personnel corresponding in described personnel's image have legal identity easily, it is not necessary to manual operation, it is achieved simple, convenient.
Preferably, described face recognition result is also stored.Such as, regardless of whether comparison is passed through, all store described face recognition result.Such as, store described face recognition result in chronological order in FIFO mode, monitor information in a large number as such, it is possible to provide for security protection.Preferably, also store described personnel's image and the sign of corresponding personnel thereof, including head sign, face sign, trunk sign, extremity sign and garment ornament etc..
And for example, when the personnel amount corresponding to described personnel's image is more than one, carry out recognition of face with the legal identity alignments that prestores one by one.Such as, using and carry out recognition of face one by one with the legal identity alignments that prestores, so, when there being many individuals to enter the first monitoring region simultaneously or successively, everyone will carry out comparison one by one with the legal identity that prestores, carry out recognition of face.Preferably, the sign of these people is also stored.Such as, the cycle that further comprises the steps of: obtains defences wanted circular convict's information jointly, set up wanted criminal people's identity database, and when carrying out recognition of face, also with the comparison one by one of wanted criminal people's identity database, when passing through with arbitrary wanted circular convict's information comparison, then face recognition result is that the personnel corresponding to described personnel's image have wanted circular identity, performs urgent counter-measure;Such as, described urgent counter-measure includes warning, tissue defence strength, notifies householder or management personnel etc..So operation, there is fabulous security protection effect, substantially eliminating the generation of the potential case, offender dare not be entered, also allow for household or community defences jointly, such as at the photo of monitoring server automatic down loading updating Ministry of Public Security wanted criminal, when major case is violated or recidivist enters monitoring region, and alarm.
Such as, in step S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when the personnel corresponding to described personnel's image are introduced into described second monitoring region, then subsequent step it is performed without.
Preferably, in step S0, pre-set some described first monitoring devices and some described second monitoring devices.Preferably, each described first monitoring device rotates and arranges;And/or, each described second monitoring device rotates and arranges.Preferably, in step S2, carry out recognition of face from multi-angle.Such as, in step S2, when judging to there is personnel's image, quantity always according to personnel's image drives each described first monitoring device to rotate, so that personnel's at least the first servo-actuated monitoring of monitoring device described in corresponding to each described personnel's image, i.e. rotate along with the movement of the personnel corresponding to described personnel's image, leave the monitoring range of the first monitoring device until its this, preferably, now another first monitoring device continues to rotate the movement of the personnel corresponding to described personnel's image.As such, it is possible to obtain preferable monitoring effect.Preferably, in step S3, continue to carry out recognition of face from multi-angle, to judge whether the personnel corresponding to described personnel's image enter described second monitoring region;Or, in order to simplify program, in step S3, without carrying out recognition of face, continue to be monitored from multi-angle, and drive each described second monitoring device to rotate according to the quantity of personnel's image, so that at least the second servo-actuated monitoring of monitoring device described in of the personnel corresponding to each described personnel's image.
Preferably, in step S3, according to the personnel amount corresponding to described personnel's image, it may be judged whether there is at least one people and enter described second monitoring region.That is, the personnel corresponding to described personnel's image of described first monitoring data, can be change, when the described first some people monitoring data disappears, and when being introduced into described second monitoring region, then judge that it leaves monitoring region, without comprehending, when the described first some people monitoring data disappears, and when entering described second monitoring region, then judge whether that at least one people enters described second monitoring region, need to pay close attention to.
Preferably, in step S2, it is judged that when there is personnel's image, then each independent persons designer's labelling corresponding to described personnel's image.Under normal circumstances, this number will not be the highest, and such as, worker labels is three bit digital or 4 bit digital, wherein can arrange flag, and such as, it is fat or thin etc. that flag is used for indicating men and women, old and young's height.Preferably, in step S3, according to the worker labels of each independent persons corresponding to described personnel's image, it is judged that whether it enters described second monitoring region;Once enter, then key monitoring.Preferably, for each independent persons corresponding to described personnel's image, it is its designer's labelling according to its appearance order.And/or, for each independent persons corresponding to described personnel's image, it is its designer's labelling according to its personal feature.Such as, worker labels includes time of occurrence and personal feature, uses numeral to represent, such as, 201511110123888888, wherein, 201511110123 is time of occurrence, and 888888 is 6 personal features, specifically can arrange by actual demand;Such as, personal feature includes figure feature.Such as, described figure feature includes above-mentioned sign;Such as, described figure feature includes head sign, trunk sign or extremity sign.Preferably, described figure feature also includes details sign, and such as, described figure feature includes above-mentioned details sign.Preferably, described personal feature also includes wearing feature, such as, and the color of clothes, style, if be branded as, by crutch etc..As such, it is possible to be monitored easily and record.
Such as, in step S4, judge whether the personnel corresponding to described personnel's image have legal identity according to face recognition result, be to continue executing with subsequent step;Such as, illegal identity alarm is otherwise sent;That is, when the personnel corresponding to described personnel's image have legal identity, then subsequent step is continued executing with, it is not necessary to send illegal identity alarm;When personnel corresponding to described personnel's image do not have legal identity, then send illegal identity alarm.And for example, otherwise send illegal identity alarm, and abandon performing subsequent step;After i.e. sending illegal identity alarm, no longer perform subsequent step, such as, no longer perform step S5.
Preferably, in step S4, judge whether the full complement corresponding to described personnel's image has legal identity according to face recognition result.Or, in step S4, judge whether the arbitrary personnel corresponding to described personnel's image have legal identity according to face recognition result.
Preferably, send illegal identity alarm, including the information that sends to default monitor terminal.Preferably, when sending illegal identity alarm, also control described default monitor terminal and give a warning voice prompt.Such as, default monitor terminal includes resident family's mobile phone, manager's mobile phone, locality-police's mobile phone and/or area under one's jurisdiction local police station monitor terminal etc., send illegal identity alarm, including the information that sends to resident family's mobile phone, manager's mobile phone, locality-police's mobile phone and/or area under one's jurisdiction local police station monitor terminal etc..Preferably, send illegal identity alarm, also include that the information that sends is to default monitoring display screen.Such as, the information that sends presets monitoring display screen to community or area under one's jurisdiction local police station presets monitoring display screen.Preferably, sending illegal identity alarm, also include the sound that gives a warning, such as, " constituent parts notes, finds unidentified personnel, alarms ", can play certain effect of intimidateing, the prevention case occurs.Preferably, when sending illegal identity alarm, store the described first monitoring data of correspondence and described second monitoring data the most respectively.Such as, after the described first monitoring data of storage correspondence and described second monitoring data, it is also transmitted to preset monitor terminal.Preferably, when sending illegal identity alarm, also start high-definition monitoring equipment, servo-actuated acquisition high-definition monitoring data;As such, it is possible to provide evidence clearly, it is particularly suitable for monitoring and security protection.
Such as, in step S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.Such as, it is, sends and trail alarm, i.e. judge whether described first monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening.And for example, otherwise automatic door opening record enabling information;That is, it is judged that whether described first monitoring data exist the personnel of trailing, it is to send and trail alarm, otherwise automatic door opening record enabling information.Such as, described enabling information includes opening time, enabling object, monitoring image or video etc..Preferably, in step S5, automatic door opening after recording enabling information, also send described enabling information to default monitor terminal.So, monitor terminal is preset it is known that the most why people has opened door.
Preferably, in step S5, before automatic door opening, also judge whether described second monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening.Such as, step S5 comprises the following steps: judge whether described first monitoring data and described second monitoring data exist the personnel of trailing respectively, and arbitrary judged result is yes, then send and trail alarm, otherwise automatic door opening record enabling information.
Preferably, send and trail alarm, including the information that sends to default monitor terminal.Preferably, send when trailing alarm, also send and trail alarm signal to default police reporting center.Preferably, described default monitor terminal send and trail alarm signal to described default police reporting center.As such, it is possible to and alarm, send help signal.Preferably, send and trail alarm, also include that the information that sends is to default monitoring display screen.Such as, also the most described first monitoring data are shown at described default monitoring display screen;And/or, also show the most described second monitoring data at described default monitoring display screen.As such, it is possible to offer relevant evidence.
Preferably, sending and trail alarm, also include the contact details that prestore corresponding to described personnel's image with the personnel of legal identity, automatically dial its phone, prompting has people to trail;So, the personnel with legal identity trailed, it is possible to be notified in time, take the precautionary measures, such as, turn to the safety zone such as administrative office or room security, and personal safety and the family's property safety of the personnel with legal identity that trailed have been significantly greatly increased.And for example, use joint prevention and control mode, send and trail alarm, also include that the community personnel helped each other to neighbourhood or next door resident family send help signal, or send joint defence sound in community, thus be prevented effectively from the case and occur, ensure the safety of the personnel with legal identity.
Preferably, in step S0, also set up zone of protection and protecting, monitoring equipment thereof and protective door;Described zone of protection is disposed adjacent with described second monitoring region, and described second monitoring region monitors between region and described zone of protection described first;In step S5, judge when personnel are trailed in described first monitoring data existence, obtain the protecting, monitoring data of described zone of protection, determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door.Preferably, described protective door is arranged between described zone of protection and described second monitoring region.So; there is the user of legal identity in any case; Additional Protection can be obtained; such as, some unit one zone of protection of composition of same floor, these unit are externally unified arranges same protective door; when the personnel with legal identity enter described zone of protection and the personnel that trail are introduced into described zone of protection; then close described protective door, will trail outside personnel are isolated from, using the teaching of the invention it is possible to provide many one layer of physics guarantees.Such as, skyscraper is H type structure, elevator is in horizontal line position, the resident family with legal identity finds the person of harboring evil designs when elevator, resident family proceeds to rapidly vertical line position after going out elevator, the person that now do not harbors evil designs presses hard the most step by step and goes slowly in horizontal line position, within protective door is arranged on horizontal line position and intersection, vertical line position or vertical line position, now determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door, there are the personnel of legal identity from infringement with protection, the incidence rate into room homicide case can also be prevented to a certain extent.
Preferably, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein there is the number of legal identity more than 1, then continue executing with subsequent step.Such as, a legal resident family can carry a little relatives and friends to come in;Preferably, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing;And for example, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing, otherwise report to the police or notify manager or send notification to the personnel with legal identity.The most described security implications is a v-sign or an OK gesture etc..So, if legal resident family, i.e. there are the personnel corresponding to described personnel's image of legal identity, be affected by coercing, as long as he does not send security implications, or give the security implications made mistake, the most automatically report to the police.Preferably, corresponding first monitoring data and/or the second monitoring data are also sent during warning, to provide evidence.And for example, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein everyone is respectively provided with legal identity, then subsequent step is continued executing with.So, a legal resident family just must can carry a little relatives and friends to come in after registration.
Further, embodiments of the invention also include, each technical characteristic of the various embodiments described above, are mutually combined the Intelligent Community method for managing and monitoring of formation.
It should be noted that above-mentioned each technical characteristic continues to be mutually combined, form various embodiments the most enumerated above, be accordingly to be regarded as the scope that description of the invention is recorded;Further, for those of ordinary skills, can be improved according to the above description or be converted, and all these modifications and variations all should be belonged to the protection domain of claims of the present invention.
Claims (10)
1. an Intelligent Community method for managing and monitoring, it is characterised in that comprise the following steps:
S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;
S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;
S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;
S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;
According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step, otherwise send illegal identity alarm, and abandon performing subsequent step;
S5, it is judged that whether described first monitoring data exist the personnel of trailing, and are to send and trail alarm, otherwise automatic door opening.
According to face recognition result, the most according to claim 1, Intelligent Community method for managing and monitoring, it is characterised in that in step S4, judge whether the full complement corresponding to described personnel's image has legal identity.
According to face recognition result, the most according to claim 1, Intelligent Community method for managing and monitoring, it is characterised in that in step S4, judge whether the arbitrary personnel corresponding to described personnel's image have legal identity.
The most according to claim 1, Intelligent Community method for managing and monitoring, it is characterised in that send illegal identity alarm, including the information that sends to default monitor terminal.
The most according to claim 4, Intelligent Community method for managing and monitoring, it is characterised in that when sending illegal identity alarm, also control described default monitor terminal and give a warning voice prompt.
The most according to claim 4, Intelligent Community method for managing and monitoring, it is characterised in that send illegal identity alarm, also include that the information that sends is to default monitoring display screen.
Intelligent Community method for managing and monitoring the most according to claim 4, it is characterised in that send illegal identity alarm, also include the sound that gives a warning.
The most according to claim 1, Intelligent Community method for managing and monitoring, it is characterised in that when sending illegal identity alarm, store the described first monitoring data of correspondence and described second monitoring data the most respectively.
Intelligent Community method for managing and monitoring the most according to claim 8, it is characterised in that after the described first monitoring data of storage correspondence and described second monitoring data, be also transmitted to preset monitor terminal.
The most according to claim 8, Intelligent Community method for managing and monitoring, it is characterised in that when sending illegal identity alarm, also start high-definition monitoring equipment, servo-actuated acquisition high-definition monitoring data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510949022.7A CN105989685A (en) | 2015-12-18 | 2015-12-18 | Intelligent community monitoring management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510949022.7A CN105989685A (en) | 2015-12-18 | 2015-12-18 | Intelligent community monitoring management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105989685A true CN105989685A (en) | 2016-10-05 |
Family
ID=57040002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510949022.7A Pending CN105989685A (en) | 2015-12-18 | 2015-12-18 | Intelligent community monitoring management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105989685A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108520579A (en) * | 2018-03-14 | 2018-09-11 | 深圳励飞科技有限公司 | With administrative staff's correlating method, device, terminal and storage medium |
CN111275850A (en) * | 2018-11-19 | 2020-06-12 | 深圳光启智能光子技术有限公司 | Access control method and system |
CN112837462A (en) * | 2020-12-31 | 2021-05-25 | 重庆数宜信信用管理有限公司 | Face recognition access control system and access control system control method |
-
2015
- 2015-12-18 CN CN201510949022.7A patent/CN105989685A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108520579A (en) * | 2018-03-14 | 2018-09-11 | 深圳励飞科技有限公司 | With administrative staff's correlating method, device, terminal and storage medium |
CN111275850A (en) * | 2018-11-19 | 2020-06-12 | 深圳光启智能光子技术有限公司 | Access control method and system |
CN112837462A (en) * | 2020-12-31 | 2021-05-25 | 重庆数宜信信用管理有限公司 | Face recognition access control system and access control system control method |
CN112837462B (en) * | 2020-12-31 | 2023-05-12 | 重庆数宜信信用管理有限公司 | Face recognition access control system and access control system control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105931316A (en) | Intelligent area monitoring method | |
CN105957286A (en) | Intelligent community safety method | |
CN105929696A (en) | Intelligent home security method | |
US10223888B2 (en) | Personnel authentication and tracking system | |
JP6608911B2 (en) | Door and home security system and method | |
CN202976256U (en) | Intelligent entrance guard control system | |
CN105931405A (en) | Intelligent area security method | |
US7397371B2 (en) | Security system access control and method | |
US20140125754A1 (en) | Web portal for managing premise security | |
CN205788358U (en) | Work attendance gate control system | |
EP3224816B1 (en) | Home security system | |
AU2017357131A1 (en) | Doorbell call center | |
CN206115524U (en) | Door control system for building | |
CN106355693A (en) | Home security system and implementation method thereof | |
CN102063750A (en) | Anti-following AB door entrance/exit management system | |
CN106713481A (en) | Intelligent community security system based on Internet of things | |
CN111243147A (en) | Intelligent community artificial intelligence access & exit management system | |
CN106285418A (en) | Intelligent household-entry safety door system | |
KR20210029953A (en) | Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology | |
WO2023280273A1 (en) | Control method and system | |
CN104484915A (en) | Intelligent door lock grading defence organizing method and grading defence organizing system thereof | |
CN105989685A (en) | Intelligent community monitoring management method | |
CN105991975A (en) | Intelligent multilevel security monitoring method | |
CN208433076U (en) | Safety precaution and emergency commading system and wisdom prison system | |
CN105933643A (en) | Intelligent home monitoring method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161005 |