CN105991975A - Intelligent multilevel security monitoring method - Google Patents

Intelligent multilevel security monitoring method Download PDF

Info

Publication number
CN105991975A
CN105991975A CN201510949020.8A CN201510949020A CN105991975A CN 105991975 A CN105991975 A CN 105991975A CN 201510949020 A CN201510949020 A CN 201510949020A CN 105991975 A CN105991975 A CN 105991975A
Authority
CN
China
Prior art keywords
monitoring
personnel
region
image
protecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510949020.8A
Other languages
Chinese (zh)
Inventor
罗书克
周雅
张元敏
王红玲
张广韬
耿跃峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuchang University
Original Assignee
Xuchang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuchang University filed Critical Xuchang University
Priority to CN201510949020.8A priority Critical patent/CN105991975A/en
Publication of CN105991975A publication Critical patent/CN105991975A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides an intelligent multilevel security monitoring method comprising the steps that a first monitoring area and first monitoring equipment thereof and a second monitoring area and second monitoring equipment thereof are preset; the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area are acquired; existence of a personnel image is judged according to the first monitoring data, face recognition is performed if the judgment result is yes and the subsequent steps are continued, or performing of the subsequent steps is abandoned; whether a corresponding personnel according to the personnel image enters the second monitoring area is judged, the subsequent steps are continued if the judgment result is yes, or performing of the subsequent steps is abandoned; whether the corresponding personnel of the personnel image has legal identity is judged according to the face recognition result, and the subsequent steps are continued if the judgment result is yes; and existence of following personnel in the first monitoring data is judged, or the door opens automatically. Legal user judgment is realized, and the hidden or disguised following personnel can be discovered; and automatic door opening for the legal user can be realized.

Description

A kind of intelligent multistage security-protecting and monitoring method
Technical field
The present invention relates to Smart Home, intelligent monitoring and intelligent security guard system, in particular, a kind of intelligent multistage security-protecting and monitoring method.
Background technology
Existing household or the monitoring of community and security protection, realize often through photographic head, such as, a photographic head is being set in front of the door, but, photographic head often can only monitor a small region, the resident family the biggest one section of region before door does not ensure, also cannot take precautions against tailer, especially malice tailer, hide in after one's death or disguise as neighbours, the most unfavorable to it before trailing the door of resident family the most always.
Summary of the invention
The technical problem to be solved is to provide a kind of multistage security-protecting and monitoring method of new intelligence.
Technical scheme is as follows: a kind of intelligent multistage security-protecting and monitoring method, and it comprises the following steps: S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step;S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.
Preferably, in step S0, described first monitoring region partially overlaps setting with described second monitoring region.
Preferably, in step S0, described first monitoring region is disposed adjacent with described second monitoring region.
Preferably, in step S0, also set up zone of protection and protecting, monitoring equipment thereof and protective door;Described zone of protection is disposed adjacent with described second monitoring region, and described second monitoring region monitors between region and described zone of protection described first;In step S5, judge when personnel are trailed in described first monitoring data existence, obtain the protecting, monitoring data of described zone of protection, determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door.
Preferably, described protective door is arranged between described zone of protection and described second monitoring region.
Preferably, in step S0, pre-set some described first monitoring devices and some described second monitoring devices.
Preferably, each described first monitoring device rotates and arranges.
Preferably, each described second monitoring device rotates and arranges.
Preferably, in step S2, carry out recognition of face from multi-angle.
Preferably, in step S2, it is judged that when there is personnel's image, the quantity always according to personnel's image drives each described first monitoring device to rotate, so that at least the first servo-actuated monitoring of monitoring device described in of the personnel corresponding to each described personnel's image.
Using such scheme, the present invention arranges monitoring region by classification, and the personnel that have employed face recognition technology judge, it is possible to achieve validated user and the judgement of disabled user, no matter hides or pretends can find tailer in time and effectively;Automatic door opening is achieved for validated user, the most intelligent and convenient, it is particularly suitable for the two full resident families of hands.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of one embodiment of the invention.
Detailed description of the invention
For the ease of understanding the present invention, below in conjunction with the accompanying drawings and specific embodiment, the present invention will be described in more detail.This specification and accompanying drawing thereof give the preferred embodiment of the present invention, but, the present invention may utilize various forms and realizes, however it is not limited to the embodiment described by this specification.On the contrary, providing the purpose of these embodiments is to make the understanding to the disclosure more thorough comprehensively.
It should be noted that when a certain element is fixed on another element, including this element being directly fixed on this another element, or this element is fixed on this another element by least one other element placed in the middle.When an element connects another element, including this element being directly connected to this another element, or this element is connected to this another element by least one other element placed in the middle.
As it is shown in figure 1, the present invention example is, a kind of intelligent multistage security-protecting and monitoring method, it comprises the following steps: step S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when there is not personnel's image, then subsequent step it is performed without;S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when the personnel corresponding to described personnel's image are introduced into described second monitoring region, then subsequent step it is performed without;According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step;Such as, illegal identity alarm is otherwise sent;That is, when the personnel corresponding to described personnel's image have legal identity, then subsequent step is continued executing with, it is not necessary to send illegal identity alarm;When personnel corresponding to described personnel's image do not have legal identity, then send illegal identity alarm;Wherein, described in send illegal identity alarm, including manager or resident family being sent illegal identity alarm, or send illegal identity alarm to default management terminal, or send illegal identity alarm to alarm center or area under one's jurisdiction local police station, or send alarm sound etc.;And for example, otherwise send illegal identity alarm, and abandon performing subsequent step;After i.e. sending illegal identity alarm, no longer perform subsequent step, such as, no longer perform step S5;S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.Such as, it is, sends and trail alarm, i.e. judge whether described first monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening;And for example, otherwise automatic door opening record enabling information;That is, it is judged that whether described first monitoring data exist the personnel of trailing, it is to send and trail alarm, otherwise automatic door opening record enabling information;Wherein, described in send and trail alarm and include manager or resident family are sent trailing alarm, or send to default management terminal and trail alarm, or send to alarm center or area under one's jurisdiction local police station and trail alarm, or send alarm sound etc..
Such as, in step S0, pre-set the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;Such as, centered by certain house or building, the scope outside the first monitoring region is radius 10 meters or 20 meters and within 100 meters, the second monitoring region is the scope within radius 10 meters or 20 meters.And for example, centered by door or gate, the second monitoring region is outside it and scope within radius 10 meters or 20 meters, the scope outside the first monitoring region is radius 10 meters or 20 meters and within 100 meters.And for example, outside community or community or specific region, some scopes are the first monitoring region, and such as these some scopes determine according to the ability of monitoring device, for example, the monitoring radius of the photographic head of monitoring device;The big outer side of door in house is the second monitoring region, after i.e. entering community or community or specific region, until house is big outdoors, is the second monitoring region.By that analogy.So, monitoring region is set by classification, validated user, general population can be distinguished targetedly and trail personnel etc., carry out follow-up effective differentiation and reply.
Such as, in step S0, described first monitoring region partially overlaps setting with described second monitoring region;And for example, in step S0, described first monitoring region is disposed adjacent with described second monitoring region.Preferably, in step S0, described first monitoring region is disposed adjacent with described second monitoring region and partially overlaps.This way it is possible to avoid the existence at monitoring dead angle, strengthen the effectiveness of monitoring.
Such as, in step S0, pre-set the first monitoring region and some first monitoring devices thereof, with the second monitoring region and some second monitoring devices thereof, such as, some first monitoring devices are arranged for described first monitoring region, some second monitoring devices are arranged for described second monitoring region, each monitoring device, including each first monitoring device and each second monitoring device, it is connected respectively to a monitoring server, unification collects monitoring data, described supervision packet includes the first monitoring data of each first monitoring device and the second monitoring data of each second monitoring device, or can be understood as, described supervision packet includes the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region.Preferably, each monitoring device is provided with mounting seat and is rotatably installed in the photographic head in described mounting seat, preferably, the built-in communicator of described mounting seat, controller and driver, described communicator is connected with described driver by described controller, for receiving the control instruction of described monitoring server, described controller controls photographic head described in described driver drives and rotates, such as, rotate along with the movement of monitored object;Further, described communicator is also connected with described photographic head, for receiving the camera data of described photographic head, as described monitoring data, and is sent to described monitoring server.Preferably, described communicator and described monitoring server wireless connections.As such, it is possible to conveniently realize data communication, upload monitoring data and issue control instruction.And for example, arranging solaode outside described mounting seat, it connects the accumulator that described mounting seat is built-in, for powering with described driver for described communicator, described controller.
Such as, in step S1, obtain the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;Such as, wireless communication mode is used to obtain the first monitoring data and the second monitoring data in described second monitoring region, the most described monitoring data in described first monitoring region.And for example, the described first monitoring data of wireless acquisition and described second monitor data respectively;And for example, the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region are automatically obtained;And for example, self-timing obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;And for example, the cycle obtains described first monitoring data and described second monitoring data;And for example, automatic cycle obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;And for example, described first monitoring data and described second monitoring data are obtained in real time;And for example, the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region are obtained the most in real time;And for example, synchronize to obtain described first monitoring data and described second monitoring data.
Preferably, step S1 comprises the following steps: obtain described first monitoring data, it may be judged whether change, be, obtains described second monitoring data.Such as, it is to start described second monitoring device, obtains described second monitoring data.And for example, otherwise abandon obtaining described second monitoring data.That is, step S1 comprises the following steps: obtain described first monitoring data, it may be judged whether change, be, start described second monitoring device, obtains described second monitoring data, otherwise abandons obtaining described second monitoring data.So, under safe condition, it is not necessary to start described second monitoring device, such that it is able to energy efficient.Preferably, described first monitoring data are obtained, it may be judged whether change, use following steps to realize: two frame data before and after sequentially in the first monitoring data described in comparison, it may be judged whether change.Such as, two frame data before and after frame by frame in the first monitoring data described in comparison, it may be judged whether change.It is to say, each frame is all compared with previous frame, as such, it is possible to the very first time finds whether change occurs, such as, many people on picture.Preferably, when the biochron occurs, it is determined that change.Such that making is that a vagrant dog comes in, discovery also can be monitored in time.
Preferably, after step S1, before step S2, further comprise the steps of: according to described first monitoring data and described second monitoring data, it may be judged whether occur abnormal, be to report to the police, upload abnormal image or anomalous video;Preferably, also start the precautionary measures, such as automatic door-closing, automatically lock a door, automatic window-closing, automatically lock window, automatically fall fence etc., to strengthen house security.Such as, breaking out of fire etc., then judge to occur extremely, and report to the police, upload abnormal image or anomalous video as warning evidence.And for example, after step S1, before step S2, further comprise the steps of: according to described first monitoring data and described second monitoring data, it may be judged whether activate pre-conditioned, be, start the precautionary measures, such as automatic door-closing, automatically lock a door, automatic window-closing, automatically lock window, automatically fall fence etc..Such as, when raining, automatic window-closing.And for example, have unidentified personage near time, automatically lock a door.
Such as, in step S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when there is not personnel's image, then subsequent step it is performed without.
Preferably, in step S2, judge whether personnel's image according to default sign;Such as, described default sign includes head sign, trunk sign and extremity sign;Preferably, the sign that walks upright also is included.Such as, when occurring one, there is head, trunk and extremity and upright walking biochron, then it is determined that the presence of personnel's image.Preferably, described default sign also includes medicated clothing feature, such as, when cold snap is wrapped up in the most tight, can judge whether personnel's image by medicated clothing feature;Preferably, described default sign also includes ability to act feature, such as, a biology walking upright and being moved in urban district, the most substantially can determine that and there is personnel's image.
Such as, judge whether personnel's image according to default sign, be, carry out recognition of face according to described personnel's image.Such as, recognition of face is carried out according to the details sign in described personnel's image.Such as, described details sign includes that eyes sign, nose sign gill lobe are levied, and recognizes described personnel's image by eyes, nose and ear and distinguishes the most different personnel.Preferably, described details sign also includes hair sign;And/or, described details sign also includes cervical region sign;And/or, described details sign also includes colour of skin sign;And/or, described details sign also includes stature sign.So, recognized by details, recognition of face can be carried out, thus assert validated user, and can greatly reduce error.
Preferably, in step S2, use and the legal identity alignments that prestores carries out recognition of face.Such as, prestore in system some legal identities, and such as, prestore in monitoring server some legal identities, and such as, legal identity is legal resident family or the legal resident family of certain community in certain house, and such as, it prestores head portrait in monitoring server;And for example, contact method is also prestored in monitoring server.Such as, using and time the legal identity alignments that prestores carries out recognition of face, according to the details sign in described personnel's image, and the legal identity comparison one by one that prestores, to judge whether the personnel corresponding to described personnel's image have legal identity.Preferably, described details sign is head feature, and such as, described details sign is same as above.
Such as, when employing carries out recognition of face with the legal identity alignments that prestores, according to the details sign in described personnel's image, with the legal identity comparison one by one that prestores, pass through with arbitrary legal identity comparison that prestores, then face recognition result is that the personnel corresponding to described personnel's image have legal identity.And for example, legal identity comparison is not all passed through with all prestoring, then face recognition result is that the personnel corresponding to described personnel's image do not have legal identity.As such, it is possible to automatically confirm that whether personnel corresponding in described personnel's image have legal identity easily, it is not necessary to manual operation, it is achieved simple, convenient.
Preferably, described face recognition result is also stored.Such as, regardless of whether comparison is passed through, all store described face recognition result.Such as, store described face recognition result in chronological order in FIFO mode, monitor information in a large number as such, it is possible to provide for security protection.Preferably, also store described personnel's image and the sign of corresponding personnel thereof, including head sign, face sign, trunk sign, extremity sign and garment ornament etc..
And for example, when the personnel amount corresponding to described personnel's image is more than one, carry out recognition of face with the legal identity alignments that prestores one by one.Such as, using and carry out recognition of face one by one with the legal identity alignments that prestores, so, when there being many individuals to enter the first monitoring region simultaneously or successively, everyone will carry out comparison one by one with the legal identity that prestores, carry out recognition of face.Preferably, the sign of these people is also stored.Such as, the cycle that further comprises the steps of: obtains defences wanted circular convict's information jointly, set up wanted criminal people's identity database, and when carrying out recognition of face, also with the comparison one by one of wanted criminal people's identity database, when passing through with arbitrary wanted circular convict's information comparison, then face recognition result is that the personnel corresponding to described personnel's image have wanted circular identity, performs urgent counter-measure;Such as, described urgent counter-measure includes warning, tissue defence strength, notifies householder or management personnel etc..So operation, there is fabulous security protection effect, substantially eliminating the generation of the potential case, offender dare not be entered, also allow for household or community defences jointly, such as at the photo of monitoring server automatic down loading updating Ministry of Public Security wanted criminal, when major case is violated or recidivist enters monitoring region, and alarm.
Such as, in step S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step;Such as, otherwise abandon performing subsequent step;That is, when the personnel corresponding to described personnel's image are introduced into described second monitoring region, then subsequent step it is performed without.
Preferably, in step S0, pre-set some described first monitoring devices and some described second monitoring devices.Preferably, each described first monitoring device rotates and arranges;And/or, each described second monitoring device rotates and arranges.Preferably, in step S2, carry out recognition of face from multi-angle.Such as, in step S2, when judging to there is personnel's image, quantity always according to personnel's image drives each described first monitoring device to rotate, so that personnel's at least the first servo-actuated monitoring of monitoring device described in corresponding to each described personnel's image, i.e. rotate along with the movement of the personnel corresponding to described personnel's image, leave the monitoring range of the first monitoring device until its this, preferably, now another first monitoring device continues to rotate the movement of the personnel corresponding to described personnel's image.As such, it is possible to obtain preferable monitoring effect.Preferably, in step S3, continue to carry out recognition of face from multi-angle, to judge whether the personnel corresponding to described personnel's image enter described second monitoring region;Or, in order to simplify program, in step S3, without carrying out recognition of face, continue to be monitored from multi-angle, and drive each described second monitoring device to rotate according to the quantity of personnel's image, so that at least the second servo-actuated monitoring of monitoring device described in of the personnel corresponding to each described personnel's image.
Preferably, in step S3, according to the personnel amount corresponding to described personnel's image, it may be judged whether there is at least one people and enter described second monitoring region.That is, the personnel corresponding to described personnel's image of described first monitoring data, can be change, when the described first some people monitoring data disappears, and when being introduced into described second monitoring region, then judge that it leaves monitoring region, without comprehending, when the described first some people monitoring data disappears, and when entering described second monitoring region, then judge whether that at least one people enters described second monitoring region, need to pay close attention to.
Preferably, in step S2, it is judged that when there is personnel's image, then each independent persons designer's labelling corresponding to described personnel's image.Under normal circumstances, this number will not be the highest, and such as, worker labels is three bit digital or 4 bit digital, wherein can arrange flag, and such as, it is fat or thin etc. that flag is used for indicating men and women, old and young's height.Preferably, in step S3, according to the worker labels of each independent persons corresponding to described personnel's image, it is judged that whether it enters described second monitoring region;Once enter, then key monitoring.Preferably, for each independent persons corresponding to described personnel's image, it is its designer's labelling according to its appearance order.And/or, for each independent persons corresponding to described personnel's image, it is its designer's labelling according to its personal feature.Such as, worker labels includes time of occurrence and personal feature, uses numeral to represent, such as, 201511110123888888, wherein, 201511110123 is time of occurrence, and 888888 is 6 personal features, specifically can arrange by actual demand;Such as, personal feature includes figure feature.Such as, described figure feature includes above-mentioned sign;Such as, described figure feature includes head sign, trunk sign or extremity sign.Preferably, described figure feature also includes details sign, and such as, described figure feature includes above-mentioned details sign.Preferably, described personal feature also includes wearing feature, such as, and the color of clothes, style, if be branded as, by crutch etc..As such, it is possible to be monitored easily and record.
Such as, in step S4, judge whether the personnel corresponding to described personnel's image have legal identity according to face recognition result, be to continue executing with subsequent step;Such as, illegal identity alarm is otherwise sent;That is, when the personnel corresponding to described personnel's image have legal identity, then subsequent step is continued executing with, it is not necessary to send illegal identity alarm;When personnel corresponding to described personnel's image do not have legal identity, then send illegal identity alarm.And for example, otherwise send illegal identity alarm, and abandon performing subsequent step;After i.e. sending illegal identity alarm, no longer perform subsequent step, such as, no longer perform step S5.
Preferably, in step S4, judge whether the full complement corresponding to described personnel's image has legal identity according to face recognition result.Or, in step S4, judge whether the arbitrary personnel corresponding to described personnel's image have legal identity according to face recognition result.
Preferably, send illegal identity alarm, including the information that sends to default monitor terminal.Preferably, when sending illegal identity alarm, also control described default monitor terminal and give a warning voice prompt.Such as, default monitor terminal includes resident family's mobile phone, manager's mobile phone, locality-police's mobile phone and/or area under one's jurisdiction local police station monitor terminal etc., send illegal identity alarm, including the information that sends to resident family's mobile phone, manager's mobile phone, locality-police's mobile phone and/or area under one's jurisdiction local police station monitor terminal etc..Preferably, send illegal identity alarm, also include that the information that sends is to default monitoring display screen.Such as, the information that sends presets monitoring display screen to community or area under one's jurisdiction local police station presets monitoring display screen.Preferably, sending illegal identity alarm, also include the sound that gives a warning, such as, " constituent parts notes, finds unidentified personnel, alarms ", can play certain effect of intimidateing, the prevention case occurs.Preferably, when sending illegal identity alarm, store the described first monitoring data of correspondence and described second monitoring data the most respectively.Such as, after the described first monitoring data of storage correspondence and described second monitoring data, it is also transmitted to preset monitor terminal.Preferably, when sending illegal identity alarm, also start high-definition monitoring equipment, servo-actuated acquisition high-definition monitoring data;As such, it is possible to provide evidence clearly, it is particularly suitable for monitoring and security protection.
Such as, in step S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.Such as, it is, sends and trail alarm, i.e. judge whether described first monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening.And for example, otherwise automatic door opening record enabling information;That is, it is judged that whether described first monitoring data exist the personnel of trailing, it is to send and trail alarm, otherwise automatic door opening record enabling information.Such as, described enabling information includes opening time, enabling object, monitoring image or video etc..Preferably, in step S5, automatic door opening after recording enabling information, also send described enabling information to default monitor terminal.So, monitor terminal is preset it is known that the most why people has opened door.
Preferably, in step S5, before automatic door opening, also judge whether described second monitoring data exist the personnel of trailing, be to send and trail alarm, otherwise automatic door opening.Such as, step S5 comprises the following steps: judge whether described first monitoring data and described second monitoring data exist the personnel of trailing respectively, and arbitrary judged result is yes, then send and trail alarm, otherwise automatic door opening record enabling information.
Preferably, send and trail alarm, including the information that sends to default monitor terminal.Preferably, send when trailing alarm, also send and trail alarm signal to default police reporting center.Preferably, described default monitor terminal send and trail alarm signal to described default police reporting center.As such, it is possible to and alarm, send help signal.Preferably, send and trail alarm, also include that the information that sends is to default monitoring display screen.Such as, also the most described first monitoring data are shown at described default monitoring display screen;And/or, also show the most described second monitoring data at described default monitoring display screen.As such, it is possible to offer relevant evidence.
Preferably, sending and trail alarm, also include the contact details that prestore corresponding to described personnel's image with the personnel of legal identity, automatically dial its phone, prompting has people to trail;So, the personnel with legal identity trailed, it is possible to be notified in time, take the precautionary measures, such as, turn to the safety zone such as administrative office or room security, and personal safety and the family's property safety of the personnel with legal identity that trailed have been significantly greatly increased.And for example, use joint prevention and control mode, send and trail alarm, also include that the community personnel helped each other to neighbourhood or next door resident family send help signal, or send joint defence sound in community, thus be prevented effectively from the case and occur, ensure the safety of the personnel with legal identity.
Preferably, in step S0, also set up zone of protection and protecting, monitoring equipment thereof and protective door;Described zone of protection is disposed adjacent with described second monitoring region, and described second monitoring region monitors between region and described zone of protection described first;In step S5, judge when personnel are trailed in described first monitoring data existence, obtain the protecting, monitoring data of described zone of protection, determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door.Preferably, described protective door is arranged between described zone of protection and described second monitoring region.So; there is the user of legal identity in any case; Additional Protection can be obtained; such as, some unit one zone of protection of composition of same floor, these unit are externally unified arranges same protective door; when the personnel with legal identity enter described zone of protection and the personnel that trail are introduced into described zone of protection; then close described protective door, will trail outside personnel are isolated from, using the teaching of the invention it is possible to provide many one layer of physics guarantees.Such as, skyscraper is H type structure, elevator is in horizontal line position, the resident family with legal identity finds the person of harboring evil designs when elevator, resident family proceeds to rapidly vertical line position after going out elevator, the person that now do not harbors evil designs presses hard the most step by step and goes slowly in horizontal line position, within protective door is arranged on horizontal line position and intersection, vertical line position or vertical line position, now determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door, there are the personnel of legal identity from infringement with protection, the incidence rate into room homicide case can also be prevented to a certain extent.
Preferably, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein there is the number of legal identity more than 1, then continue executing with subsequent step.Such as, a legal resident family can carry a little relatives and friends to come in;Preferably, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing;And for example, in step S5, also judge whether the personnel with legal identity provide security implications, be, judge that described first monitoring data do not exist the personnel of trailing, otherwise report to the police or notify manager or send notification to the personnel with legal identity.The most described security implications is a v-sign or an OK gesture etc..So, if legal resident family, i.e. there are the personnel corresponding to described personnel's image of legal identity, be affected by coercing, as long as he does not send security implications, or give the security implications made mistake, the most automatically report to the police.Preferably, corresponding first monitoring data and/or the second monitoring data are also sent during warning, to provide evidence.And for example, when the personnel amount corresponding to described personnel's image is more than one, in step S4, it is judged that when wherein everyone is respectively provided with legal identity, then subsequent step is continued executing with.So, a legal resident family just must can carry a little relatives and friends to come in after registration.
Further, embodiments of the invention also include, each technical characteristic of the various embodiments described above, are mutually combined the multistage security-protecting and monitoring method of intelligence of formation.
It should be noted that above-mentioned each technical characteristic continues to be mutually combined, form various embodiments the most enumerated above, be accordingly to be regarded as the scope that description of the invention is recorded;Further, for those of ordinary skills, can be improved according to the above description or be converted, and all these modifications and variations all should be belonged to the protection domain of claims of the present invention.

Claims (10)

1. the multistage security-protecting and monitoring method of intelligence, it is characterised in that comprise the following steps:
S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;
S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;
S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;
S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;
According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step;
S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, described first monitoring region partially overlaps setting with described second monitoring region.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, described first monitoring region is disposed adjacent with described second monitoring region.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, also sets up zone of protection and protecting, monitoring equipment thereof and protective door;Described zone of protection is disposed adjacent with described second monitoring region, and described second monitoring region monitors between region and described zone of protection described first;In step S5, judge when personnel are trailed in described first monitoring data existence, obtain the protecting, monitoring data of described zone of protection, determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that described protective door is arranged between described zone of protection and described second monitoring region.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, pre-sets some described first monitoring devices and some described second monitoring devices.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that each described first monitoring device rotates and arranges.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that each described second monitoring device rotates and arranges.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S2, carries out recognition of face from multi-angle.
The most intelligent multistage security-protecting and monitoring method, it is characterized in that, in step S2, when judging to there is personnel's image, quantity always according to personnel's image drives each described first monitoring device to rotate, so that at least the first servo-actuated monitoring of monitoring device described in of the personnel corresponding to each described personnel's image.
CN201510949020.8A 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method Pending CN105991975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510949020.8A CN105991975A (en) 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510949020.8A CN105991975A (en) 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method

Publications (1)

Publication Number Publication Date
CN105991975A true CN105991975A (en) 2016-10-05

Family

ID=57039651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510949020.8A Pending CN105991975A (en) 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method

Country Status (1)

Country Link
CN (1) CN105991975A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399674A (en) * 2018-05-09 2018-08-14 苏州七巧板日用品科技有限公司 A kind of intelligent safety door
CN109035534A (en) * 2018-08-31 2018-12-18 北京诚志重科海图科技有限公司 A kind of gate inhibition's monitoring method, controller and system
CN111064928A (en) * 2019-12-10 2020-04-24 湖北牡丹科技发展有限公司 Video monitoring system with face recognition function

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399674A (en) * 2018-05-09 2018-08-14 苏州七巧板日用品科技有限公司 A kind of intelligent safety door
CN109035534A (en) * 2018-08-31 2018-12-18 北京诚志重科海图科技有限公司 A kind of gate inhibition's monitoring method, controller and system
CN111064928A (en) * 2019-12-10 2020-04-24 湖北牡丹科技发展有限公司 Video monitoring system with face recognition function

Similar Documents

Publication Publication Date Title
CN105931316A (en) Intelligent area monitoring method
CN105957286A (en) Intelligent community safety method
CN105929696A (en) Intelligent home security method
AU2023270262B2 (en) Doorbell call center
US10223888B2 (en) Personnel authentication and tracking system
US9685071B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
JP6608911B2 (en) Door and home security system and method
CN105931405A (en) Intelligent area security method
US20140125754A1 (en) Web portal for managing premise security
CN108412315A (en) A kind of intelligent door lock caution system and its control method
CN205788358U (en) Work attendance gate control system
US9728077B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
EP3224816B1 (en) Home security system
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
CN106355693A (en) Home security system and implementation method thereof
CN111243147A (en) Intelligent community artificial intelligence access & exit management system
WO2023280273A1 (en) Control method and system
CN104484915A (en) Intelligent door lock grading defence organizing method and grading defence organizing system thereof
CN105991975A (en) Intelligent multilevel security monitoring method
CN105989685A (en) Intelligent community monitoring management method
CN208433076U (en) Safety precaution and emergency commading system and wisdom prison system
CN105933643A (en) Intelligent home monitoring method
CN108961508A (en) A kind of access control system based on iris recognition
CN206788888U (en) A kind of new A TM recognition of face guard systems
CN105264483A (en) Web portal for managing premise security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161005

WD01 Invention patent application deemed withdrawn after publication