CN105991975A - Intelligent multilevel security monitoring method - Google Patents

Intelligent multilevel security monitoring method Download PDF

Info

Publication number
CN105991975A
CN105991975A CN201510949020.8A CN201510949020A CN105991975A CN 105991975 A CN105991975 A CN 105991975A CN 201510949020 A CN201510949020 A CN 201510949020A CN 105991975 A CN105991975 A CN 105991975A
Authority
CN
China
Prior art keywords
monitoring
person
personnel
protecting
monitoring data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510949020.8A
Other languages
Chinese (zh)
Inventor
罗书克
周雅
张元敏
王红玲
张广韬
耿跃峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuchang University
Original Assignee
Xuchang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuchang University filed Critical Xuchang University
Priority to CN201510949020.8A priority Critical patent/CN105991975A/en
Publication of CN105991975A publication Critical patent/CN105991975A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

本发明提供了一种智能多级安防监控方法,其包括步骤:预设置第一监控区域及其第一监控设备、与第二监控区域及其第二监控设备;获取第一监控区域的第一监控数据及第二监控区域的第二监控数据;根据第一监控数据,判断是否存在人员图像,是则进行人脸识别并继续执行后续步骤,否则放弃执行后续步骤;判断根据人员图像所对应的人员是否进入第二监控区域,是则继续执行后续步骤,否则放弃执行后续步骤;根据人脸识别结果判断人员图像所对应的人员是否具有合法身份,是则继续执行后续步骤;判断第一监控数据是否存在尾随人员,否则自动开门。本发明实现了合法用户判定,无论隐匿还是伪装都能发现尾随者;对于合法用户实现了自动开门。

The invention provides an intelligent multi-level security monitoring method, which includes the steps of: pre-setting the first monitoring area and its first monitoring equipment, and the second monitoring area and its second monitoring equipment; obtaining the first monitoring area of the first monitoring area The monitoring data and the second monitoring data of the second monitoring area; according to the first monitoring data, it is judged whether there is a person image, if yes, face recognition is performed and the subsequent steps are continued, otherwise the subsequent steps are abandoned; the judgment is based on the person image corresponding Whether the person enters the second monitoring area, if yes, continue to execute the subsequent steps, otherwise give up the execution of the subsequent steps; judge whether the person corresponding to the person image has a legal identity according to the face recognition result, if yes, continue to execute the subsequent steps; judge the first monitoring data Whether there is a trailing person, otherwise the door will be opened automatically. The invention realizes legal user judgment, and the trailing person can be found regardless of concealment or camouflage; for legal users, automatic door opening is realized.

Description

一种智能多级安防监控方法An intelligent multi-level security monitoring method

技术领域 technical field

本发明涉及智能家居、智能监控及智能安防体系,尤其涉及的是,一种智能多级安防监控方法。 The present invention relates to smart home, smart monitoring and smart security systems, in particular to an intelligent multi-level security monitoring method.

背景技术 Background technique

现有的家居或社区的监控及安防,往往通过摄像头来实现,例如,在门前设置一个摄像头,但是,摄像头往往只能监控一小片区域,住户在门户之前的很大一段区域是没有保障的,也无法防范尾随者,尤其是恶意尾随者,隐匿于身后或伪装为邻居,例如一直尾随到住户的门户之前突然对其不利。 The monitoring and security of existing homes or communities are often realized through cameras. For example, a camera is set in front of the door. However, the camera can only monitor a small area, and the residents in a large area before the door are not guaranteed. , nor can it prevent stalkers, especially malicious stalkers, who hide behind or pretend to be neighbors, such as stalking the resident's door before suddenly being unfavorable to it.

发明内容 Contents of the invention

本发明所要解决的技术问题是提供一种新的智能多级安防监控方法。 The technical problem to be solved by the invention is to provide a new intelligent multi-level security monitoring method.

本发明的技术方案如下:一种智能多级安防监控方法,其包括以下步骤:S0,预设置第一监控区域及其第一监控设备、与第二监控区域及其第二监控设备;S1,获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;S2,根据所述第一监控数据,判断是否存在人员图像,是则进行人脸识别并继续执行后续步骤,否则放弃执行后续步骤;S3,判断所述人员图像所对应的人员是否进入所述第二监控区域,是则继续执行后续步骤,否则放弃执行后续步骤;S4,根据人脸识别结果判断所述人员图像所对应的人员是否具有合法身份,是则继续执行后续步骤;S5,判断所述第一监控数据是否存在尾随人员,否则自动开门。 The technical solution of the present invention is as follows: an intelligent multi-level security monitoring method, which includes the following steps: S0, presetting the first monitoring area and its first monitoring equipment, and the second monitoring area and its second monitoring equipment; S1, Obtain the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area; S2, according to the first monitoring data, determine whether there is a person image, if so, perform face recognition and continue to execute Subsequent steps, otherwise give up the execution of the subsequent steps; S3, judge whether the person corresponding to the person image has entered the second monitoring area, if yes, continue to execute the subsequent steps, otherwise give up the execution of the subsequent steps; S4, judge according to the face recognition result Whether the person corresponding to the person image has a legal identity, if so, proceed to the next step; S5, judge whether there is a trailing person in the first monitoring data, otherwise automatically open the door.

优选的,步骤S0中,所述第一监控区域与所述第二监控区域部分重合设置。 Preferably, in step S0, the first monitoring area is partially overlapped with the second monitoring area.

优选的,步骤S0中,所述第一监控区域与所述第二监控区域相邻设置。 Preferably, in step S0, the first monitoring area is set adjacent to the second monitoring area.

优选的,步骤S0中,还设置防护区域及其防护监控设备、以及防护门;所述防护区域与所述第二监控区域相邻设置,所述第二监控区域位于所述第一监控区域与所述防护区域之间;步骤S5中,判断所述第一监控数据存在尾随人员时,获取所述防护区域的防护监控数据,进一步判断具有合法身份的人员进入所述防护区域且尾随人员未进入所述防护区域,则关闭所述防护门。 Preferably, in step S0, a protection area and its protection monitoring equipment, and a protection door are also set; the protection area is adjacent to the second monitoring area, and the second monitoring area is located between the first monitoring area and Between the protected areas; in step S5, when it is judged that there is a trailing person in the first monitoring data, the protected monitoring data of the protected area is obtained, and it is further judged that a person with a legal identity enters the protected area and the trailing person does not enter the protection area, then close the protection door.

优选的,所述防护门设置于所述防护区域与所述第二监控区域之间。 Preferably, the protection door is arranged between the protection area and the second monitoring area.

优选的,步骤S0中,预设置若干所述第一监控设备及若干所述第二监控设备。 Preferably, in step S0, several first monitoring devices and several second monitoring devices are preset.

优选的,各所述第一监控设备转动设置。 Preferably, each of the first monitoring devices is set to rotate.

优选的,各所述第二监控设备转动设置。 Preferably, each of the second monitoring devices is set to rotate.

优选的,步骤S2中,从多角度进行人脸识别。 Preferably, in step S2, face recognition is performed from multiple angles.

优选的,步骤S2中,判断存在人员图像时,还根据人员图像的数量驱动各所述第一监控设备转动,以使每一所述人员图像所对应的人员至少有一所述第一监控设备随动监控。 Preferably, in step S2, when it is determined that there is a person image, each of the first monitoring devices is also driven to rotate according to the number of person images, so that at least one person corresponding to each person image has at least one of the first monitoring devices. dynamic monitoring.

采用上述方案,本发明通过分级设置监控区域,及采用了人脸识别技术的人员判断,可以实现合法用户与非法用户的判定,无论隐匿还是伪装都能及时且有效地发现尾随者;对于合法用户实现了自动开门,非常智能且便利,特别适合两手满满的住户。 By adopting the above scheme, the present invention can realize the determination of legal users and illegal users by setting the monitoring area hierarchically and using the personnel judgment of face recognition technology, and can find the trailing person in time and effectively regardless of concealment or camouflage; for legal users It realizes automatic door opening, which is very smart and convenient, especially suitable for residents with full hands.

附图说明 Description of drawings

图1是本发明一实施例的示意图。 Fig. 1 is a schematic diagram of an embodiment of the present invention.

具体实施方式 detailed description

为了便于理解本发明,下面结合附图和具体实施例,对本发明进行更详细的说明。本说明书及其附图中给出了本发明的较佳的实施例,但是,本发明可利用各种形式来实现,并不限于本说明书所描述的实施例。相反地,提供这些实施例的目的是使对本发明的公开内容的理解更加透彻全面。 In order to facilitate the understanding of the present invention, the present invention will be described in more detail below in conjunction with the accompanying drawings and specific embodiments. The preferred embodiments of the present invention are shown in this specification and the accompanying drawings, however, the present invention can be implemented in various forms and is not limited to the embodiments described in this specification. On the contrary, these embodiments are provided to make the understanding of the disclosure of the present invention more thorough and comprehensive.

需要说明的是,当某一元件固定于另一个元件,包括将该元件直接固定于该另一个元件,或者将该元件通过至少一个居中的其它元件固定于该另一个元件。当一个元件连接另一个元件,包括将该元件直接连接到该另一个元件,或者将该元件通过至少一个居中的其它元件连接到该另一个元件。 It should be noted that when a certain element is fixed to another element, it includes directly fixing the element to the other element, or fixing the element to the other element through at least one other element in the middle. When an element is connected to another element, it includes directly connecting the element to the other element, or connecting the element to the other element through at least one intervening other element.

如图1所示,本发明的一个例子是,一种智能多级安防监控方法,其包括以下步骤:步骤S0,预设置第一监控区域及其第一监控设备、与第二监控区域及其第二监控设备;S1,获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;S2,根据所述第一监控数据,判断是否存在人员图像,是则进行人脸识别并继续执行后续步骤;例如,否则放弃执行后续步骤;即,不存在人员图像时,则无需执行后续步骤;S3,判断所述人员图像所对应的人员是否进入所述第二监控区域,是则继续执行后续步骤;例如,否则放弃执行后续步骤;即,所述人员图像所对应的人员未进入所述第二监控区域时,则无需执行后续步骤;S4,根据人脸识别结果判断所述人员图像所对应的人员是否具有合法身份,是则继续执行后续步骤;例如,否则发出非法身份警报;即,所述人员图像所对应的人员具有合法身份时,则继续执行后续步骤,无需发出非法身份警报;所述人员图像所对应的人员不具有合法身份时,则发出非法身份警报;其中,所述发出非法身份警报,包括对管理员或者住户发送非法身份警报,或者向预设管理终端发送非法身份警报,或者向报警中心或辖区派出所发送非法身份警报,或者发出报警声音等;又如,否则发出非法身份警报,并且放弃执行后续步骤;即发出非法身份警报后,不再执行后续步骤,例如,不再执行步骤S5;S5,判断所述第一监控数据是否存在尾随人员,否则自动开门。例如,是则发出尾随警报,即,判断所述第一监控数据是否存在尾随人员,是则发出尾随警报,否则自动开门;又如,否则自动开门并记录开门信息;即,判断所述第一监控数据是否存在尾随人员,是则发出尾随警报,否则自动开门并记录开门信息;其中,所述发出尾随警报包括对管理员或者住户发送尾随警报,或者向预设管理终端发送尾随警报,或者向报警中心或辖区派出所发送尾随警报,或者发出报警声音等。 As shown in Figure 1, an example of the present invention is an intelligent multi-level security monitoring method, which includes the following steps: Step S0, presetting the first monitoring area and its first monitoring equipment, and the second monitoring area and its The second monitoring device; S1, acquiring the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area; S2, judging whether there is a person image according to the first monitoring data, if yes, Carry out face recognition and continue to perform subsequent steps; for example, otherwise give up performing subsequent steps; that is, when there is no person image, then do not need to perform subsequent steps; S3, determine whether the person corresponding to the person image enters the second monitoring area, if yes, then continue to perform the subsequent steps; for example, otherwise give up the execution of the subsequent steps; that is, when the person corresponding to the person image does not enter the second monitoring area, then there is no need to perform the subsequent steps; S4, according to the face recognition result Determine whether the person corresponding to the person image has a legal identity, and if so, continue to perform the subsequent steps; for example, otherwise send an illegal identity alarm; that is, when the person corresponding to the person image has a legal identity, continue to perform the subsequent steps, There is no need to issue an illegal identity alarm; when the person corresponding to the person image does not have a legal identity, an illegal identity alarm is issued; wherein, the sending of an illegal identity alarm includes sending an illegal identity alarm to an administrator or a resident, or sending an alarm to a preset The management terminal sends an illegal identity alarm, or sends an illegal identity alarm to the alarm center or the police station in the jurisdiction, or sends out an alarm sound; another example, otherwise, an illegal identity alarm is issued, and the subsequent steps are abandoned; that is, after the illegal identity alarm is issued, no further execution Subsequent steps, for example, do not execute step S5; S5, judge whether there is a trailing person in the first monitoring data, or automatically open the door. For example, if it is, a tailgating alarm is issued, that is, it is judged whether there is a trailing person in the first monitoring data, and if it is, a trailing alarm is issued, otherwise the door is automatically opened; If there is a trailing person in the monitoring data, it will send a trailing alarm, otherwise the door will be opened automatically and the door opening information will be recorded; The alarm center or the police station in the jurisdiction sends a trailing alarm, or sends out an alarm sound, etc.

例如,步骤S0中,预设置第一监控区域及其第一监控设备、与第二监控区域及其第二监控设备;例如,以某房屋或楼房为中心,第一监控区域为半径10米或20米之外且100米之内的范围,第二监控区域为半径10米或20米之内的范围。又如,以房门或者大门为中心,第二监控区域为其外侧且半径10米或20米之内的范围,第一监控区域为半径10米或20米之外且100米之内的范围。又如,小区或社区或特定区域外侧若干范围为第一监控区域,例如该若干范围根据监控设备的能力确定,例如为监控设备的摄像头的监测半径;房屋大门外侧为第二监控区域,即进入小区或社区或特定区域之后,一直到房屋大门外,均为第二监控区域。以此类推。这样,通过分级设置监控区域,可以有针对性地区分合法用户、普通人群及尾随人员等,进行后续有效区分和应对。 For example, in step S0, the first monitoring area and its first monitoring equipment, and the second monitoring area and its second monitoring equipment are preset; for example, with a house or building as the center, the first monitoring area has a radius of 10 meters or The range outside 20 meters and within 100 meters, the second monitoring area is the range within a radius of 10 meters or 20 meters. For another example, with the door or gate as the center, the second monitoring area is outside and within a radius of 10 meters or 20 meters, and the first monitoring area is outside the radius of 10 meters or 20 meters and within 100 meters . As another example, a certain area outside a community or a specific area is the first monitoring area, for example, the several areas are determined according to the capabilities of the monitoring equipment, such as the monitoring radius of the camera of the monitoring equipment; the outside of the house gate is the second monitoring area, that is, entering After the community or community or a specific area, it is the second monitoring area all the way to the outside of the house gate. and so on. In this way, by setting the monitoring area hierarchically, it is possible to distinguish legitimate users, ordinary people, and tailgating personnel in a targeted manner, and carry out subsequent effective distinction and response.

例如,步骤S0中,所述第一监控区域与所述第二监控区域部分重合设置;又如,步骤S0中,所述第一监控区域与所述第二监控区域相邻设置。优选的,步骤S0中,所述第一监控区域与所述第二监控区域相邻设置且部分重合。这样,可以避免监控死角的存在,增强监控的有效性。 For example, in step S0, the first monitoring area is partially overlapped with the second monitoring area; as another example, in step S0, the first monitoring area is adjacent to the second monitoring area. Preferably, in step S0, the first monitoring area and the second monitoring area are set adjacent to and partly overlap each other. In this way, the existence of monitoring dead angle can be avoided, and the effectiveness of monitoring can be enhanced.

例如,步骤S0中,预设置第一监控区域及其若干第一监控设备、与第二监控区域及其若干第二监控设备,例如,对于所述第一监控区域设置若干第一监控设备,对于所述第二监控区域设置若干第二监控设备,各监控设备,包括各第一监控设备及各第二监控设备,分别连接到一个监控服务器,统一汇总监控数据,所述监控数据包括各第一监控设备的第一监控数据及各第二监控设备的第二监控数据,或者可以理解为,所述监控数据包括所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据。优选的,各监控设备设置有安装座及转动安装在所述安装座上的摄像头,优选的,所述安装座内置通讯器、控制器与驱动器,所述通讯器通过所述控制器与所述驱动器连接,用于接收所述监控服务器的控制指令,由所述控制器控制所述驱动器驱动所述摄像头转动,例如,随着监控对象的移动而转动;并且,所述通讯器还与所述摄像头连接,用于接收所述摄像头的摄像数据,作为所述监控数据,并发送到所述监控服务器。优选的,所述通讯器与所述监控服务器无线连接。这样,可以方便地实现数据通讯,上传监控数据及下发控制指令。又如,所述安装座外设置太阳能电池,其连接所述安装座内置的蓄电池,用于为所述通讯器、所述控制器与所述驱动器供电。 For example, in step S0, preset the first monitoring area and its several first monitoring devices, and the second monitoring area and its several second monitoring devices, for example, set several first monitoring devices for the first monitoring area, for The second monitoring area is provided with a plurality of second monitoring devices, and each monitoring device, including each first monitoring device and each second monitoring device, is respectively connected to a monitoring server to uniformly summarize monitoring data, and the monitoring data includes each first monitoring device The first monitoring data of the monitoring equipment and the second monitoring data of each second monitoring equipment, or it can be understood that the monitoring data includes the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area. Monitor data. Preferably, each monitoring device is provided with a mount and a camera rotatably mounted on the mount. Preferably, the mount has a built-in communicator, a controller and a driver, and the communicator communicates with the controller through the The driver is connected to receive the control instruction from the monitoring server, and the controller controls the driver to drive the camera to rotate, for example, to rotate with the movement of the monitored object; and, the communicator is also connected to the The camera is connected, and is used to receive the camera data of the camera as the monitoring data and send it to the monitoring server. Preferably, the communicator is wirelessly connected to the monitoring server. In this way, data communication can be realized conveniently, monitoring data can be uploaded and control commands can be issued. In another example, a solar cell is arranged outside the mounting base, which is connected to a storage battery built in the mounting base to provide power for the communicator, the controller and the driver.

例如,步骤S1中,获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;例如,采用无线通讯方式获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据,即所述监控数据。又如,分别无线获取所述第一监控数据及所述第二监控数据;又如,自动获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;又如,自动定时获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;又如,周期获取所述第一监控数据及所述第二监控数据;又如,自动周期获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;又如,实时获取所述第一监控数据及所述第二监控数据;又如,自动实时获取所述第一监控区域的第一监控数据及所述第二监控区域的第二监控数据;又如,同步获取所述第一监控数据及所述第二监控数据。 For example, in step S1, the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area are obtained; for example, the first monitoring data and the first monitoring data of the first monitoring area are obtained by wireless communication. The second monitoring data of the second monitoring area is the monitoring data. As another example, wirelessly acquire the first monitoring data and the second monitoring data respectively; as another example, automatically acquire the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area; For example, automatically and regularly acquire the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area; as another example, periodically acquire the first monitoring data and the second monitoring data; as another example , automatically and periodically acquire the first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area; as another example, acquire the first monitoring data and the second monitoring data in real time; as another example, The first monitoring data of the first monitoring area and the second monitoring data of the second monitoring area are automatically acquired in real time; as another example, the first monitoring data and the second monitoring data are acquired synchronously.

优选的,步骤S1包括以下步骤:获取所述第一监控数据,判断是否发生变化,是则获取所述第二监控数据。例如,是则启动所述第二监控设备,获取所述第二监控数据。又如,否则放弃获取所述第二监控数据。即,步骤S1包括以下步骤:获取所述第一监控数据,判断是否发生变化,是则启动所述第二监控设备,获取所述第二监控数据,否则放弃获取所述第二监控数据。这样,在安全状况下,无需启动所述第二监控设备,从而可以节约能耗。优选的,获取所述第一监控数据,判断是否发生变化,采用以下步骤实现:顺序比对所述第一监控数据中的前后两帧数据,判断是否发生变化。例如,逐帧比对所述第一监控数据中的前后两帧数据,判断是否发生变化。也就是说,每一帧都跟上一帧进行比对,这样,可以第一时间发现变化是否发生,例如,画面上多了一个人。优选的,当出现生物时,判定发生变化。这样,即使是一只流浪狗进来,也能及时监控发现。 Preferably, step S1 includes the following steps: acquiring the first monitoring data, judging whether there is a change, and if yes, acquiring the second monitoring data. For example, if yes, start the second monitoring device to acquire the second monitoring data. For another example, otherwise, the acquisition of the second monitoring data is abandoned. That is, step S1 includes the following steps: acquiring the first monitoring data, and judging whether there is a change, if yes, starting the second monitoring device to acquire the second monitoring data, otherwise giving up acquiring the second monitoring data. In this way, in a safe situation, there is no need to activate the second monitoring device, thereby saving energy consumption. Preferably, acquiring the first monitoring data and judging whether there is a change is realized by the following steps: sequentially comparing two frames of data before and after the first monitoring data, and judging whether there is a change. For example, compare the data of two frames before and after the first monitoring data frame by frame to determine whether there is a change. In other words, each frame is compared with the previous frame, so that you can find out whether any changes have occurred in the first place, for example, there is an extra person on the screen. Preferably, when a creature is present, the determination changes. In this way, even if a stray dog comes in, it can be monitored and found in time.

优选的,步骤S1之后,步骤S2之前,还包括步骤:根据所述第一监控数据及所述第二监控数据,判断是否发生异常,是则报警,上传异常图像或异常视频;优选的,还启动防范措施,例如自动关门、自动锁门、自动关窗、自动锁窗,自动降下栅栏等,以增强家居安全。例如,发生火灾等,则判定发生异常,并报警,上传异常图像或异常视频作为报警证据。又如,步骤S1之后,步骤S2之前,还包括步骤:根据所述第一监控数据及所述第二监控数据,判断是否激活预设条件,是则启动防范措施,例如自动关门、自动锁门、自动关窗、自动锁窗,自动降下栅栏等。例如,下雨时,自动关窗。又如,有不明身份人士靠近时,自动锁门等。 Preferably, after step S1 and before step S2, it further includes the step of: judging whether an abnormality occurs according to the first monitoring data and the second monitoring data, and if so, alarming, and uploading abnormal images or abnormal videos; preferably, Activate preventive measures such as auto-close, auto-lock, auto-close, auto-lock windows, auto-lower fences, etc. to enhance home security. For example, if a fire occurs, it is determined that an abnormality has occurred, and an alarm is issued, and an abnormal image or abnormal video is uploaded as evidence of the alarm. As another example, after step S1 and before step S2, further include the step of: judging whether to activate the preset condition according to the first monitoring data and the second monitoring data, and if so, start preventive measures, such as automatically closing the door, automatically locking the door , Automatically close the window, automatically lock the window, automatically lower the fence, etc. For example, when it rains, the windows are automatically closed. Another example is that when an unknown person approaches, the door is automatically locked.

例如,步骤S2中,根据所述第一监控数据,判断是否存在人员图像,是则进行人脸识别并继续执行后续步骤;例如,否则放弃执行后续步骤;即,不存在人员图像时,则无需执行后续步骤。 For example, in step S2, according to the first monitoring data, it is judged whether there is a person image, if yes, face recognition is performed and the subsequent steps are continued; for example, otherwise, the execution of the subsequent steps is abandoned; Follow the next steps.

优选的,步骤S2中,根据预设体征判断是否存在人员图像;例如,所述预设体征包括头部体征、躯干体征及四肢体征;优选的,还包括直立行走体征。例如,当出现一个具有头部、躯干及四肢且直立行走的生物时,则判定存在人员图像。优选的,所述预设体征还包括衣物特征,例如,在寒冷天气裹得比较严实时,可通过衣物特征判断是否存在人员图像;优选的,所述预设体征还包括行动能力特征,例如,市区内一个直立行走且发生移动的生物,则基本上可判定存在人员图像。 Preferably, in step S2, it is judged whether there is a person image according to preset signs; for example, the preset signs include head signs, torso signs and limb signs; preferably, upright walking signs are also included. For example, when a creature with a head, torso, and limbs appears and walks upright, it is determined that there is a person image. Preferably, the preset signs also include clothing characteristics, for example, when the clothes are tightly wrapped in cold weather, whether there is a person image can be judged through the clothing characteristics; preferably, the preset signs also include mobility characteristics, for example, A creature that walks upright and moves in an urban area can basically determine the existence of a person image.

例如,根据预设体征判断是否存在人员图像,是则根据所述人员图像进行人脸识别。例如,根据所述人员图像中的细节体征进行人脸识别。例如,所述细节体征包括眼睛体征、鼻子体征及耳朵体征,通过眼睛、鼻子及耳朵来辨认所述人员图像和区别其中不同的人员。优选的,所述细节体征还包括头发体征;和/或,所述细节体征还包括颈部体征;和/或,所述细节体征还包括肤色体征;和/或,所述细节体征还包括身材体征。这样,通过细节辨认,可以进行人脸识别,从而认定合法用户,并能极大降低误差。 For example, it is judged according to preset signs whether there is a person image, and if so, face recognition is performed based on the person image. For example, face recognition is performed according to the detailed signs in the person image. For example, the detailed signs include eye signs, nose signs and ear signs, and the person images are identified and different persons are distinguished through the eyes, nose and ears. Preferably, the detailed signs also include hair signs; and/or, the detailed signs also include neck signs; and/or, the detailed signs also include skin color signs; and/or, the detailed signs also include body signs. In this way, through the identification of details, face recognition can be performed to identify legitimate users and greatly reduce errors.

优选的,步骤S2中,采用与预存合法身份比对方式进行人脸识别。例如,系统内预存若干合法身份,例如,监控服务器内预存若干合法身份,例如,合法身份为某房屋的合法住户或者某社区的合法住户,例如,其预存头像在监控服务器内;又如,还预存联系方式在监控服务器内。例如,采用与预存合法身份比对方式进行人脸识别时,根据所述人员图像中的细节体征,与预存合法身份一一比对,以判断所述人员图像所对应的人员是否具有合法身份。优选的,所述细节体征为头部特征,例如,所述细节体征同上所述。 Preferably, in step S2, face recognition is performed by comparing with pre-stored legal identities. For example, several legal identities are pre-stored in the system. For example, several legal identities are pre-stored in the monitoring server. The pre-stored contact information is in the monitoring server. For example, when face recognition is performed by comparing with pre-stored legal identities, according to the detailed physical signs in the person image, it is compared with the pre-stored legal identities one by one to determine whether the person corresponding to the person image has a legal identity. Preferably, the detailed signs are head features, for example, the detailed signs are as described above.

例如,采用与预存合法身份比对方式进行人脸识别时,根据所述人员图像中的细节体征,与预存合法身份一一比对,与任一预存合法身份比对通过,则人脸识别结果为所述人员图像所对应的人员具有合法身份。又如,与全部预存合法身份比对均未通过,则人脸识别结果为所述人员图像所对应的人员不具有合法身份。这样,可以方便地自动确认所述人员图像中所对应的人员是否具有合法身份,无需人工操作,实现简单、方便。 For example, when using the method of comparing with pre-stored legal identities for face recognition, according to the detailed signs in the image of the person, one-to-one comparison with pre-stored legal identities, if the comparison with any pre-stored legal identities passes, the face recognition result The person corresponding to the person image has a legal identity. For another example, if the comparison with all pre-stored legal identities fails, the face recognition result shows that the person corresponding to the person image does not have a legal identity. In this way, it can conveniently and automatically confirm whether the person corresponding to the person image has a legal identity without manual operation, and the realization is simple and convenient.

优选的,还存储所述人脸识别结果。例如,无论是否比对通过,均存储所述人脸识别结果。例如,以FIFO方式按时间顺序存储所述人脸识别结果,这样,可以为安防提供大量监控信息。优选的,还存储所述人员图像及其所对应的人员的体征,包括头部体征、面部体征、躯干体征、四肢体征及服饰特征等。 Preferably, the face recognition result is also stored. For example, the face recognition result is stored no matter whether the comparison is passed or not. For example, the face recognition results are stored in chronological order in a FIFO manner, so that a large amount of monitoring information can be provided for security. Preferably, the person image and the corresponding person's signs are also stored, including head signs, facial signs, torso signs, limb signs, clothing features, and the like.

又如,所述人员图像所对应的人员数量超过一个时,逐一与预存合法身份比对方式进行人脸识别。例如,采用逐一与预存合法身份比对方式进行人脸识别,这样,当有多个人同时或先后进入第一监控区域时,每个人都要与预存合法身份进行逐一比对,进行人脸识别。优选的,还存储这些人的体征。例如,还包括步骤:周期获取协防通缉犯人信息,建立通缉犯人身份数据库,并且在进行人脸识别时,还与通缉犯人身份数据库一一比对,与任一通缉犯人信息比对通过时,则人脸识别结果为所述人员图像所对应的人员具有通缉身份,执行紧急应对措施;例如,所述紧急应对措施包括报警、组织防御力量、通知户主或者管理人员等。这样操作,具有极好的安防效果,极大地消除了潜在罪案的发生,使得犯罪分子不敢进入,也便于家居或社区协防,例如在监控服务器自动下载更新公安部通缉犯的照片,在重案犯或者累犯进入监控区域时,及时报警。 For another example, when the number of persons corresponding to the person image exceeds one, face recognition is performed by comparing them with pre-stored legal identities one by one. For example, face recognition is carried out by comparing one by one with the pre-stored legal identities, so that when multiple people enter the first monitoring area at the same time or successively, each person must be compared with the pre-stored legal identities one by one for face recognition. Preferably, the signs of these persons are also stored. For example, it also includes the steps of periodically obtaining the information of the wanted criminal for assistance in defense, establishing the identity database of the wanted criminal, and comparing it with the wanted criminal’s identity database one by one when performing face recognition. When the comparison with any wanted criminal’s information passes, Then the face recognition result shows that the person corresponding to the person image has a wanted status, and emergency response measures are taken; for example, the emergency response measures include calling the police, organizing defense forces, notifying the head of the household or management personnel, etc. This operation has an excellent security effect, which greatly eliminates the occurrence of potential crimes, making criminals afraid to enter, and it is also convenient for home or community defense. When criminals or repeat offenders enter the monitoring area, call the police in time.

例如,步骤S3中,判断所述人员图像所对应的人员是否进入所述第二监控区域,是则继续执行后续步骤;例如,否则放弃执行后续步骤;即,所述人员图像所对应的人员未进入所述第二监控区域时,则无需执行后续步骤。 For example, in step S3, it is judged whether the person corresponding to the person image has entered the second monitoring area, if yes, continue to perform the subsequent steps; When entering the second monitoring area, there is no need to perform subsequent steps.

优选的,步骤S0中,预设置若干所述第一监控设备及若干所述第二监控设备。优选的,各所述第一监控设备转动设置;和/或,各所述第二监控设备转动设置。优选的,步骤S2中,从多角度进行人脸识别。例如,步骤S2中,判断存在人员图像时,还根据人员图像的数量驱动各所述第一监控设备转动,以使每一所述人员图像所对应的人员至少有一所述第一监控设备随动监控,即随着所述人员图像所对应的人员的移动而转动,直到其该离开第一监控设备的监控范围为止,优选的,此时另一第一监控设备继续对所述人员图像所对应的人员的移动而转动。这样,可以获得较好的监控效果。优选的,步骤S3中,继续从多角度进行人脸识别,以判断所述人员图像所对应的人员是否进入所述第二监控区域;或者,为了简化程序,步骤S3中,无需进行人脸识别,继续从多角度进行监控,且根据人员图像的数量驱动各所述第二监控设备转动,以使每一所述人员图像所对应的人员至少有一所述第二监控设备随动监控。 Preferably, in step S0, several first monitoring devices and several second monitoring devices are preset. Preferably, each of the first monitoring devices is set to rotate; and/or, each of the second monitoring devices is set to rotate. Preferably, in step S2, face recognition is performed from multiple angles. For example, in step S2, when it is determined that there is a person image, each of the first monitoring devices is also driven to rotate according to the number of the person images, so that at least one of the first monitoring devices is followed by the person corresponding to each person image. Monitoring, that is, rotating with the movement of the person corresponding to the person image until it leaves the monitoring range of the first monitoring device. Preferably, at this time, another first monitoring device continues to monitor the person corresponding to the person image. The movement of the personnel rotates. In this way, a better monitoring effect can be obtained. Preferably, in step S3, face recognition is continued from multiple angles to determine whether the person corresponding to the person image has entered the second monitoring area; or, in order to simplify the procedure, face recognition is not required in step S3 , continue to monitor from multiple angles, and drive each second monitoring device to rotate according to the number of person images, so that at least one second monitoring device monitors the person corresponding to each person image.

优选的,步骤S3中,根据所述人员图像所对应的人员数量,判断是否存在至少一人进入所述第二监控区域。也就是说,所述第一监控数据的所述人员图像所对应的人员,可以是变化的,当所述第一监控数据的其中一些人消失了,而未进入所述第二监控区域时,则判定其离开监控区域,无需理会,当所述第一监控数据的其中一些人消失了,且进入所述第二监控区域时,则判断是否存在至少一人进入所述第二监控区域,需要关注。 Preferably, in step S3, it is determined whether at least one person enters the second monitoring area according to the number of persons corresponding to the person image. That is to say, the person corresponding to the person image in the first monitoring data may be changed, and when some of the people in the first monitoring data disappear without entering the second monitoring area, Then it is determined that they have left the monitoring area, and there is no need to pay attention to it. When some people in the first monitoring data disappear and enter the second monitoring area, it is judged whether there is at least one person entering the second monitoring area, which needs attention .

优选的,步骤S2中,判断存在人员图像时,则为所述人员图像所对应的每一独立人员设置人员标记。通常情况下,这个人数不会很高,例如,人员标记为三位数字或4位数字,其中可以设置标识位,例如,标识位用于标示男女老少高矮胖瘦等。优选的,步骤S3中,根据所述人员图像所对应的各独立人员的人员标记,判断其是否进入所述第二监控区域;一旦进入,则重点监控。优选的,对于所述人员图像所对应的每一独立人员,根据其出现顺序为其设置人员标记。和/或,对于所述人员图像所对应的每一独立人员,根据其个体特征为其设置人员标记。例如,人员标记包括出现时间和个体特征,采用数字表示,例如,201511110123888888,其中,201511110123为出现时间,888888为6项个体特征,具体可按实际需求设置;例如,个体特征包括身形特征。例如,所述身形特征包括上述体征;例如,所述身形特征包括头部体征、躯干体征或四肢体征。优选的,所述身形特征还包括细节体征,例如,所述身形特征包括上述细节体征。优选的,所述个体特征还包括穿着特征,例如,衣服的颜色、款式,是否戴帽子、拿拐杖等。这样,可以方便地进行监控与记录。 Preferably, in step S2, when it is determined that there is a person image, a person mark is set for each individual person corresponding to the person image. Usually, the number of people is not very high. For example, a person is marked as a three-digit number or a four-digit number, where an identification bit can be set. For example, the identification bit is used to indicate the height, height, height, etc. of men, women, children, and so on. Preferably, in step S3, according to the personal marks of the individual personnel corresponding to the personal images, it is judged whether they enter the second monitoring area; once they enter, focus on monitoring. Preferably, for each independent person corresponding to the person image, a person mark is set for it according to its appearance sequence. And/or, for each independent person corresponding to the person image, set a person mark for it according to its individual characteristics. For example, the person mark includes appearance time and individual characteristics, which are represented by numbers, for example, 201511110123888888, wherein 201511110123 is the appearance time, and 888888 is 6 individual characteristics, which can be set according to actual needs; for example, individual characteristics include body shape characteristics. For example, the body shape features include the above signs; for example, the body shape features include head signs, torso signs or limb signs. Preferably, the body shape features also include detailed signs, for example, the body shape features include the above detailed signs. Preferably, the individual characteristics also include wearing characteristics, for example, the color and style of clothes, whether to wear a hat, hold a cane, and the like. In this way, monitoring and recording can be carried out conveniently.

例如,步骤S4中,根据人脸识别结果判断所述人员图像所对应的人员是否具有合法身份,是则继续执行后续步骤;例如,否则发出非法身份警报;即,所述人员图像所对应的人员具有合法身份时,则继续执行后续步骤,无需发出非法身份警报;所述人员图像所对应的人员不具有合法身份时,则发出非法身份警报。又如,否则发出非法身份警报,并且放弃执行后续步骤;即发出非法身份警报后,不再执行后续步骤,例如,不再执行步骤S5。 For example, in step S4, it is judged according to the face recognition result whether the person corresponding to the person image has a legal identity, and if so, continue to perform subsequent steps; for example, otherwise an illegal identity alarm is issued; that is, the person corresponding to the person image When having a legal identity, then continue to perform subsequent steps without issuing an illegal identity alarm; when the person corresponding to the person image does not have a legal identity, an illegal identity alarm is issued. For another example, otherwise, an illegal identity alarm is issued, and subsequent steps are abandoned; that is, after an illegal identity alarm is issued, subsequent steps are not performed, for example, step S5 is not performed.

优选的,步骤S4中,根据人脸识别结果判断所述人员图像所对应的全部人员是否具有合法身份。或者,步骤S4中,根据人脸识别结果判断所述人员图像所对应的任一人员是否具有合法身份。 Preferably, in step S4, it is judged according to the face recognition result whether all the persons corresponding to the person images have legal identities. Alternatively, in step S4, it is judged according to the face recognition result whether any person corresponding to the person image has a legal identity.

优选的,发出非法身份警报,包括发出信息到预设监控终端。优选的,发出非法身份警报时,还控制所述预设监控终端发出警告提示声音。例如,预设监控终端包括住户手机、管理员手机、片警手机和/或辖区派出所监控终端等,发出非法身份警报,包括发出信息到住户手机、管理员手机、片警手机和/或辖区派出所监控终端等。优选的,发出非法身份警报,还包括发出信息到预设监控显示屏。例如,发出信息到社区预设监控显示屏或者辖区派出所预设监控显示屏。优选的,发出非法身份警报,还包括发出警告声音,例如,“各单位注意,发现不明身份人员,紧急集合”,可起到一定的威吓作用,预防罪案发生。优选的,发出非法身份警报时,还分别存储对应的所述第一监控数据及所述第二监控数据。例如,存储对应的所述第一监控数据及所述第二监控数据之后,还发送到预设监控终端。优选的,发出非法身份警报时,还启动高清监控设备,随动获取高清监控数据;这样,可以提供清晰的证据,特别适合监控及安防。 Preferably, issuing an illegal identity alarm includes sending information to a preset monitoring terminal. Preferably, when an illegal identity alarm is issued, the preset monitoring terminal is also controlled to issue a warning prompt sound. For example, preset monitoring terminals include resident mobile phones, administrator mobile phones, police mobile phones and/or jurisdictional police station monitoring terminals, etc., and send out illegal identity alarms, including sending information to resident mobile phones, administrator mobile phones, film police mobile phones and/or jurisdictional police station monitoring terminals Wait. Preferably, issuing an illegal identity alarm also includes sending information to a preset monitoring display screen. For example, send a message to the preset monitoring display screen in the community or the preset monitoring display screen in the police station of the jurisdiction. Preferably, sending out an illegal identity alarm also includes sending out a warning sound, for example, "all units pay attention, if unknown persons are found, gather urgently", which can play a certain intimidating role and prevent crimes from happening. Preferably, when an illegal identity alarm is issued, the corresponding first monitoring data and the second monitoring data are also stored respectively. For example, after the corresponding first monitoring data and the second monitoring data are stored, they are also sent to a preset monitoring terminal. Preferably, when an illegal identity alarm is issued, the high-definition monitoring equipment is also activated to obtain high-definition monitoring data; in this way, clear evidence can be provided, which is especially suitable for monitoring and security.

例如,步骤S5中,判断所述第一监控数据是否存在尾随人员,否则自动开门。例如,是则发出尾随警报,即,判断所述第一监控数据是否存在尾随人员,是则发出尾随警报,否则自动开门。又如,否则自动开门并记录开门信息;即,判断所述第一监控数据是否存在尾随人员,是则发出尾随警报,否则自动开门并记录开门信息。例如,所述开门信息包括开门时间、开门对象、监控图像或视频等。优选的,步骤S5中,自动开门并记录开门信息之后,还发出所述开门信息到预设监控终端。这样,预设监控终端可以知道什么时间为什么人开了门。 For example, in step S5, it is judged whether there is a trailing person in the first monitoring data, otherwise, the door is opened automatically. For example, if yes, a tailgating alarm is issued, that is, it is judged whether there is a trailing person in the first monitoring data, and if yes, a tailgating alarm is issued; otherwise, the door is automatically opened. Another example, otherwise, automatically open the door and record the door opening information; that is, determine whether there is a trailing person in the first monitoring data, and if so, issue a trailing alarm, otherwise automatically open the door and record the door opening information. For example, the door opening information includes door opening time, door opening objects, surveillance images or videos, and the like. Preferably, in step S5, after the door is automatically opened and the door opening information is recorded, the door opening information is also sent to a preset monitoring terminal. In this way, the default monitoring terminal can know when and why someone opened the door.

优选的,步骤S5中,自动开门之前,还判断所述第二监控数据是否存在尾随人员,是则发出尾随警报,否则自动开门。例如,步骤S5包括以下步骤:分别判断所述第一监控数据及所述第二监控数据是否存在尾随人员,任一判断结果为是,则发出尾随警报,否则自动开门并记录开门信息。 Preferably, in step S5, before automatically opening the door, it is also judged whether there is a trailing person in the second monitoring data, if yes, a trailing alarm is issued, otherwise, the door is automatically opened. For example, step S5 includes the following steps: respectively judging whether there is a trailing person in the first monitoring data and the second monitoring data, if any of the judging results are yes, then issue a trailing alarm, otherwise automatically open the door and record the opening information.

优选的,发出尾随警报,包括发出信息到预设监控终端。优选的,发出尾随警报时,还发出尾随报警信号到预设报案中心。优选的,由所述预设监控终端发出尾随报警信号到所述预设报案中心。这样,可以及时报警,发出求助信号。优选的,发出尾随警报,还包括发出信息到预设监控显示屏。例如,还在所述预设监控显示屏显示相应的所述第一监控数据;和/或,还在所述预设监控显示屏显示相应的所述第二监控数据。这样,可以提供相关证据。 Preferably, issuing a trailing alarm includes sending information to a preset monitoring terminal. Preferably, when a trailing alarm is issued, a trailing alarm signal is also sent to a preset reporting center. Preferably, the preset monitoring terminal sends a trailing alarm signal to the preset reporting center. Like this, can call the police in time, send the signal for help. Preferably, sending out the trailing alarm also includes sending out information to a preset monitoring display screen. For example, displaying the corresponding first monitoring data on the preset monitoring display screen; and/or displaying the corresponding second monitoring data on the preset monitoring display screen. In this way, relevant evidence can be provided.

优选的,发出尾随警报,还包括根据所述人员图像所对应具有合法身份的人员的预存联系信息,自动拨打其电话,提示有人尾随;这样,被尾随的具有合法身份的人员,能够及时得到通知,采取防范措施,例如转向管理处或者保安室等安全区域,极大增加了被尾随的具有合法身份的人员的人身安全和家庭财产安全。又如,采用联防联治方式,发出尾随警报,还包括向邻里互助的小区人员或隔壁住户发出求助信号,或者在小区发出联防声音,从而有效避免罪案发生,保障具有合法身份的人员的安全。 Preferably, sending out a tailgating alarm also includes automatically dialing the phone according to the pre-stored contact information of the person with legal identity corresponding to the image of the person, prompting someone to follow; in this way, the person with legal identity who is being followed can be notified in time , Take preventive measures, such as turning to safe areas such as the management office or the security room, which greatly increases the personal safety and family property safety of the legally-identified personnel being followed. Another example is the use of joint defense and joint treatment methods to send out tailgating alarms, including sending help signals to neighbors who are helping each other or neighbors, or sending out joint defense voices in the community, so as to effectively prevent crimes and ensure the safety of people with legal identities.

优选的,步骤S0中,还设置防护区域及其防护监控设备、以及防护门;所述防护区域与所述第二监控区域相邻设置,所述第二监控区域位于所述第一监控区域与所述防护区域之间;步骤S5中,判断所述第一监控数据存在尾随人员时,获取所述防护区域的防护监控数据,进一步判断具有合法身份的人员进入所述防护区域且尾随人员未进入所述防护区域,则关闭所述防护门。优选的,所述防护门设置于所述防护区域与所述第二监控区域之间。这样,具有合法身份的用户在一定情况下,可以得到额外保护,例如,同一楼层的若干单元组成一个防护区域,这几个单元对外统一设置同一个防护门,当具有合法身份的人员进入所述防护区域且尾随人员未进入所述防护区域,则关闭所述防护门,以将尾随人员隔离于外,能够提供多一层物理保障。例如,高层建筑为H型结构,电梯在横线位置,具有合法身份的住户在电梯时发现不怀好意者,住户出电梯后迅速转入竖线位置,此时不怀好意者往往尚未步步紧逼而慢行在横线位置,防护门设置在横线位置与竖线位置相交处或者竖线位置之内,此时进一步判断具有合法身份的人员进入所述防护区域且尾随人员未进入所述防护区域,则关闭所述防护门,以保护具有合法身份的人员免受侵害,还能在一定程度上防止入屋凶案的发生率。 Preferably, in step S0, a protection area and its protection monitoring equipment, and a protection door are also set; the protection area is adjacent to the second monitoring area, and the second monitoring area is located between the first monitoring area and Between the protected areas; in step S5, when it is judged that there is a trailing person in the first monitoring data, the protected monitoring data of the protected area is obtained, and it is further judged that a person with a legal identity enters the protected area and the trailing person does not enter the protection area, then close the protection door. Preferably, the protection door is arranged between the protection area and the second monitoring area. In this way, users with legal identities can get additional protection under certain circumstances. For example, several units on the same floor form a protective area. If the following personnel do not enter the protected area, then close the protective door to isolate the following personnel from the outside, which can provide an additional layer of physical protection. For example, a high-rise building has an H-shaped structure, and the elevator is on the horizontal line. Residents with legal identities find malicious people in the elevator, and the residents quickly turn to the vertical line after getting out of the elevator. At this time, the malicious person has not yet stepped forward. Pressing and walking slowly at the horizontal line position, the protective door is set at the intersection of the horizontal line position and the vertical line position or within the vertical line position. If the protective area is not covered, the protective door is closed to protect people with legal status from being violated, and to a certain extent, prevent the incidence of murders entering the house.

优选的,所述人员图像所对应的人员数量超过一个时,步骤S4中,判断其中具有合法身份的人数大于1时,则继续执行后续步骤。例如,一个合法住户可以带些亲朋好友进来;优选的,步骤S5中,还判断具有合法身份的人员是否给出安全暗示,是则判断所述第一监控数据不存在尾随人员;又如,步骤S5中,还判断具有合法身份的人员是否给出安全暗示,是则判断所述第一监控数据不存在尾随人员,否则报警或者通知管理员或者发送通知给具有合法身份的人员。例如所述安全暗示为一个V形手势或一个OK手势等。这样,如果合法住户,即具有合法身份的所述人员图像所对应的人员,是受到胁迫的,他只要不发出安全暗示,或者给出错误的安全暗示,则自动进行报警。优选的,报警时还发送相应的第一监控数据和/或第二监控数据,以提供证据。又如,所述人员图像所对应的人员数量超过一个时,步骤S4中,判断其中所有人均具有合法身份时,则继续执行后续步骤。这样,一个合法住户必须在登记后才可以带些亲朋好友进来。 Preferably, when the number of persons corresponding to the person image is more than one, in step S4, if it is judged that the number of people with a legal identity is greater than 1, then continue to execute subsequent steps. For example, a legal resident can bring in some relatives and friends; preferably, in step S5, it is also judged whether a person with a legal identity gives a security hint, and if so, it is judged that there is no trailing person in the first monitoring data; for another example, the step In S5, it is also judged whether the person with a legal identity gives a security hint, if so, it is judged that there is no trailing person in the first monitoring data, otherwise, an alarm is issued or the administrator is notified or a notification is sent to the person with a legal identity. For example, the security hint is a V-shaped gesture or an OK gesture. In this way, if the legal resident, that is, the person corresponding to the person image with a legal identity, is threatened, as long as he does not issue a security hint, or gives a wrong security hint, the alarm will be automatically issued. Preferably, corresponding first monitoring data and/or second monitoring data are also sent to provide evidence when an alarm is issued. As another example, when the number of persons corresponding to the person image exceeds one, in step S4, if it is judged that all of them have legal identities, then continue to execute subsequent steps. In this way, a legal resident must be registered before he can bring some relatives and friends in.

进一步地,本发明的实施例还包括,上述各实施例的各技术特征,相互组合形成的智能多级安防监控方法。 Furthermore, the embodiments of the present invention also include an intelligent multi-level security monitoring method formed by combining the technical features of the above-mentioned embodiments.

需要说明的是,上述各技术特征继续相互组合,形成未在上面列举的各种实施例,均视为本发明说明书记载的范围;并且,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,而所有这些改进和变换都应属于本发明所附权利要求的保护范围。 It should be noted that the above-mentioned technical features continue to be combined with each other to form various embodiments not listed above, which are all regarded as the scope of the description of the present invention; and, for those of ordinary skill in the art, improvements can be made according to the above description Or transformation, and all these improvements and transformations should belong to the protection scope of the appended claims of the present invention.

Claims (10)

1. the multistage security-protecting and monitoring method of intelligence, it is characterised in that comprise the following steps:
S0, pre-sets the first monitoring region and the first monitoring device thereof and the second monitoring region and the second monitoring device thereof;
S1, obtains the first monitoring data and the second monitoring data in described second monitoring region in described first monitoring region;
S2, according to described first monitoring data, it may be judged whether there is personnel's image, be, carry out recognition of face and continue executing with subsequent step, otherwise abandon performing subsequent step;
S3, it is judged that whether the personnel corresponding to described personnel's image enter described second monitoring region, are to continue executing with subsequent step, otherwise abandon performing subsequent step;
According to face recognition result, S4, judges whether the personnel corresponding to described personnel's image have legal identity, is to continue executing with subsequent step;
S5, it is judged that whether described first monitoring data exist the personnel of trailing, otherwise automatic door opening.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, described first monitoring region partially overlaps setting with described second monitoring region.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, described first monitoring region is disposed adjacent with described second monitoring region.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, also sets up zone of protection and protecting, monitoring equipment thereof and protective door;Described zone of protection is disposed adjacent with described second monitoring region, and described second monitoring region monitors between region and described zone of protection described first;In step S5, judge when personnel are trailed in described first monitoring data existence, obtain the protecting, monitoring data of described zone of protection, determine whether to have the personnel of legal identity and enter described zone of protection and the personnel that trail are introduced into described zone of protection, then close described protective door.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that described protective door is arranged between described zone of protection and described second monitoring region.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S0, pre-sets some described first monitoring devices and some described second monitoring devices.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that each described first monitoring device rotates and arranges.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that each described second monitoring device rotates and arranges.
The most intelligent multistage security-protecting and monitoring method, it is characterised in that in step S2, carries out recognition of face from multi-angle.
The most intelligent multistage security-protecting and monitoring method, it is characterized in that, in step S2, when judging to there is personnel's image, quantity always according to personnel's image drives each described first monitoring device to rotate, so that at least the first servo-actuated monitoring of monitoring device described in of the personnel corresponding to each described personnel's image.
CN201510949020.8A 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method Pending CN105991975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510949020.8A CN105991975A (en) 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510949020.8A CN105991975A (en) 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method

Publications (1)

Publication Number Publication Date
CN105991975A true CN105991975A (en) 2016-10-05

Family

ID=57039651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510949020.8A Pending CN105991975A (en) 2015-12-18 2015-12-18 Intelligent multilevel security monitoring method

Country Status (1)

Country Link
CN (1) CN105991975A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399674A (en) * 2018-05-09 2018-08-14 苏州七巧板日用品科技有限公司 A kind of intelligent safety door
CN109035534A (en) * 2018-08-31 2018-12-18 北京诚志重科海图科技有限公司 A kind of gate inhibition's monitoring method, controller and system
CN111064928A (en) * 2019-12-10 2020-04-24 湖北牡丹科技发展有限公司 Video monitoring system with face recognition function

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399674A (en) * 2018-05-09 2018-08-14 苏州七巧板日用品科技有限公司 A kind of intelligent safety door
CN109035534A (en) * 2018-08-31 2018-12-18 北京诚志重科海图科技有限公司 A kind of gate inhibition's monitoring method, controller and system
CN111064928A (en) * 2019-12-10 2020-04-24 湖北牡丹科技发展有限公司 Video monitoring system with face recognition function

Similar Documents

Publication Publication Date Title
CN105931316A (en) Intelligent area monitoring method
CN105957286A (en) Intelligent community safety method
US11785146B2 (en) Doorbell call center
CN105929696A (en) Intelligent home security method
US10657749B2 (en) Automatic system access using facial recognition
US20240265705A1 (en) Face concealment detection
CN105931405A (en) Intelligent area security method
US20180047230A1 (en) Automatic system access using facial recognition
US10127754B2 (en) Identification-based barrier techniques
CN108412315A (en) A kind of intelligent door lock caution system and its control method
CN105279872A (en) Anti-theft monitoring device and monitoring system for entrance door
KR20170045340A (en) Door and home security system and method
CN103268680A (en) A home intelligent monitoring and anti-theft system
CN205080681U (en) Register one's residence door electronic monitoring device
CN105991975A (en) Intelligent multilevel security monitoring method
CN110956768A (en) Automatic anti-theft device of intelligence house
CN105989685A (en) Intelligent community monitoring management method
CN107341940A (en) A kind of safety monitoring system and monitoring method
CN207082203U (en) A kind of intelligent safety defense monitoring system
CN108806155B (en) Security monitoring method based on Internet of things
CN105933643A (en) Intelligent home monitoring method
CN108898717A (en) A kind of intelligent safety defense monitoring system
CN104835275A (en) Infrared imaging alarm device used for burglarproof doors and windows
CN106530563A (en) Antitheft system of computer information
CN109685943A (en) A building intelligent security monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161005