CN107146350A - A kind of utilization mobile client realizes the long-range control method of real-time anti-theft - Google Patents

A kind of utilization mobile client realizes the long-range control method of real-time anti-theft Download PDF

Info

Publication number
CN107146350A
CN107146350A CN201710339761.3A CN201710339761A CN107146350A CN 107146350 A CN107146350 A CN 107146350A CN 201710339761 A CN201710339761 A CN 201710339761A CN 107146350 A CN107146350 A CN 107146350A
Authority
CN
China
Prior art keywords
image
server
personnel
subsequently
mobile client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710339761.3A
Other languages
Chinese (zh)
Inventor
刘铭皓
王秋实
丁昊怡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710339761.3A priority Critical patent/CN107146350A/en
Publication of CN107146350A publication Critical patent/CN107146350A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/1966Wireless systems, other than telephone systems, used to communicate with a camera

Abstract

The invention discloses the long-range control method that a kind of utilization mobile client realizes real-time anti-theft, including server controls step, mobile client rate-determining steps, IMAQ terminal control step, IMAQ terminal is the terminal of an Android system, terminal, which contains Wifi modules, to be connected by home wireless router with server, for obtaining the known people list and image of storage from server, and preserve;The equipment can identify face and the facial image with being stored is compared equipped with a small-sized camera with real-time capture image from image, if the picture not matched, and can send the images to server alarm;Server includes face storage system, and for storing known people list and the unknown personnel's image alarm of reception and pushing to mobile client, antitheft, rate of accuracy reached to 100% is realized by IMAQ terminal, server, mobile client;Realize instantaneous transmission, ageing height.

Description

A kind of utilization mobile client realizes the long-range control method of real-time anti-theft
Technical field
The present invention relates to a kind of theft preventing method, specifically, it is related to a kind of utilization mobile client and realizes real-time anti-theft Long-range control method, belongs to automatic control technology field.
Background technology
Thing stolen to home is often listened to occur in life now, although cell there are security personnel but still is not avoided that.Such as Fruit embedded technology is combined with development of Mobile Internet technology, realize a kind of introduction people's automatic identification and real time propelling movement to move The system of client water, it will greatly ensure lares et penates safety.
The content of the invention
Moved in view of the above-mentioned deficiencies in the prior art, the technical problem to be solved by the present invention is that providing a kind of utilize Client realizes the long-range control method of real-time anti-theft, and its simple in construction, realization is convenient, simple to operate, intelligence degree is high, just In realization, application value is high.
In order to solve the above technical problems, the technical solution adopted in the present invention is:One kind is realized real using mobile client When antitheft long-range control method, it is characterised in that including server controls step.
A kind of prioritization scheme, server controls step includes:
Start from S101, in step S102, server, which enters, monitors solicited status, waits and comes IMAQ terminal, mobile client End and spontaneous request;
Receive and enter step S103 after request;
In step S103, judge whether request is unknown personnel's alarm request from intelligent acquisition equipment, if entering step Rapid S104, otherwise into S106;
In step S104, by warning message(Facial image, time, the numbering of image including unknown personnel)It is written to database In, subsequently into step S105;
In step S105, by warning message(Facial image, time, the numbering of image including unknown personnel)It is sent to movement Client, subsequently into step S109;
In step s 106, the request from mobile client mark known people image is determined whether, if into S107, otherwise into S109;
In step s 107, the solicited message submitted according to mobile client(Including picture number, user-defined name) Image personnel's title in database is changed, then into step S108;
In step S108, identification notification is sent(The corresponding name of personnel in numbering, image including image)To face collection Smart machine, subsequently into step S109;
In step S109, determine whether to exit service routine, be then to enter step S110, otherwise into step S102;
End at step S110.
Another prioritization scheme, mobile client rate-determining steps include:
Start from S201, in step S202, set up length with server and be connected, can be immediately transmitted to move when server has notice Dynamic client;
Subsequently into step S203, in step S203, the instruction that server is sent is monitored;
Receive and enter step S204 after instruction;
In step S204, whether be unknown personnel notify, if into step S205, otherwise entering step if judging the instruction received Rapid S210;
In step S205, according to the unknown personnel's announcement information received(Including unknown personnel's facial image, picture number, adopt The collection time), the image and acquisition time of personnel is shown, subsequently into step S206;
In step S206, by user judge display image whether be understanding personnel, if into step S208, otherwise entering Enter step S207;
In step S208, user inputs the personnel's title shown in picture according to man-machine interface, subsequently into step S209;
In step S209, the title and the numbering of image that user is inputted are uploaded onto the server, subsequently into step S210;
In step S207, user can determine alarm or notifying cell security personnel according to own situation, subsequently into step S210;
In step S210, determine whether to exit service routine, if yes then enter step S211, otherwise return to step S203;
End at step S211.
Another prioritization scheme, face collection smart machine rate-determining steps include:
Start from step S301;
In step s 302, the known list and facial image of download server record, subsequently into step S303;
In step S303, by the list got and picture record into local database, subsequently into step S304;
In step S304, using camera shooting image, subsequently into step S305;
In step S305, contrasted one by one according to the realtime graphic photographed and the picture that is locally stored, subsequently into step S306;
In step S306, the image of matching is determined whether, if entering step S308, otherwise into step S307;
In step S307, the image of shooting is stored in locally, and one picture number of corresponding generation recorded in database, Then it is sent to server and sends unknown personnel's alarm, warning message includes picture, picture number, acquisition time.Subsequently into step Rapid S308;
In step S308, judge whether to get personnel's more new command that server is sent, in this way into step S309, otherwise enter Enter step S310;
In step S309, the information sended over according to server(Including picture number, personnel's name), change local picture pair The personnel's title answered, subsequently into step S310;
In step S310, determine whether to exit service routine, if into step S311, otherwise return to step S304;
End at step S311.
Based on above long-range control method, realizing the device of the long-range control method includes IMAQ terminal, service Device, mobile client.
A kind of prioritization scheme, IMAQ terminal is the terminal of an Android system, and terminal, which contains Wifi modules, to be passed through Home wireless router is connected with server, for obtaining the known people list and image of storage from server, and is preserved; The equipment can identify face and with being stored with real-time capture image equipped with small-sized camera from image Facial image is compared, if the picture not matched, and can send the images to server alarm;
Server includes face storage system, for storing known people list and the unknown personnel's image alarm of reception and pushing to Mobile client.
The present invention uses above technical scheme, compared with prior art, with advantages below:By IMAQ terminal, Server, mobile client realize antitheft, rate of accuracy reached to 100%;Realize instantaneous transmission, ageing height.
The present invention is described in detail with reference to the accompanying drawings and examples.
Brief description of the drawings
Accompanying drawing 1 is the sequence chart of server, IMAQ terminal and mobile client in the embodiment of the present invention;
Accompanying drawing 2 is the flow chart of server controls step in the embodiment of the present invention;
Accompanying drawing 3 is the flow chart of mobile client rate-determining steps in the embodiment of the present invention;
Accompanying drawing 4 is the flow chart of IMAQ terminal control step in the embodiment of the present invention.
Embodiment
Embodiment 1, as shown in figure 1, a kind of utilization mobile client realizes the long-range control method of real-time anti-theft, passes through figure Realized as acquisition terminal, server, mobile client.
IMAQ terminal is the terminal of an Android system, and terminal contains Wifi modules can be by home wireless router It is connected, for obtaining the known people list and image of storage from server, and preserves with server;The equipment is equipped with one Small-sized camera can with real-time capture image, using the OpenCV frameworks increased income, can be identified from image face and with The facial image stored is compared, if the picture not matched, and can send the images to server alarm;Server is included Face storage system, for storing known people list and the unknown personnel's image alarm of reception and pushing to mobile client.
Mobile client is used for receiving unknown personnel's image alarm and identification image name, and the image name of mark will be transmitted It is known people to server identification.
Installation steps:
IMAQ terminal is loaded on doorway opposite, camera was photographed whole doorway.
Face identification method:
The method of recognition of face be using the OpenCV increased income come the picture to shooting and deposited face picture contrast one by one come reality It is existing.
As shown in Fig. 2 server controls step:
Flow starts from S101. in step S102, and server, which enters, monitors solicited status, waits and comes IMAQ terminal, movement Client and spontaneous request;
Receive and enter step S103 after request;
In step S103, judge whether request is unknown personnel's alarm request from intelligent acquisition equipment, if entering step Rapid S104, otherwise into S106;
In step S104, by warning message(Facial image, time, the numbering of image including unknown personnel)It is written to database In, subsequently into step S105;
In step S105, by warning message(Facial image, time, the numbering of image including unknown personnel)It is sent to movement Client, subsequently into step S109;
In step s 106, the request from mobile client mark known people image is determined whether, if into S107, otherwise into S109;
In step s 107, the solicited message submitted according to mobile client(Including picture number, user-defined name) Image personnel's title in database is changed, then into step S108;
In step S108, identification notification is sent(The corresponding name of personnel in numbering, image including image)To face collection Smart machine, subsequently into step S109;
In step S109, determine whether to exit service routine, be then to enter step S110, otherwise into step S102;
Flow ends at step S110.
As shown in figure 3, mobile client rate-determining steps:
Flow starts from S201, in step S202, sets up length with server and is connected, can be sent immediately when server has notice To mobile client;
Subsequently into step S203, in step S203, the instruction that server is sent is monitored;
Receive and enter step S204 after instruction;
In step S204, whether be unknown personnel notify, if into step S205, otherwise entering step if judging the instruction received Rapid S210;
In step S205, according to the unknown personnel's announcement information received(Including unknown personnel's facial image, picture number, adopt The collection time), the image and acquisition time of personnel is shown, subsequently into step S206;
In step S206, by user judge display image whether be understanding personnel, if into step S208, otherwise entering Enter step S207;
In step S208, user inputs the personnel's title shown in picture according to man-machine interface, subsequently into step S209;
In step S209, the title and the numbering of image that user is inputted are uploaded onto the server, subsequently into step S210;
In step S207, user can determine alarm or notifying cell security personnel according to own situation, subsequently into step S210;
In step S210, determine whether to exit service routine, if yes then enter step S211, otherwise return to step S203;
Flow ends at step S211.
As shown in figure 4, IMAQ terminal control step:
Flow starts from step S301;
In step s 302, the known list and facial image of download server record, subsequently into step S303;
In step S303, by the list got and picture record into local database, subsequently into step S304;
In step S304, using camera shooting image, subsequently into step S305;
In step S305, contrasted one by one according to the realtime graphic photographed and the picture that is locally stored, subsequently into step S306;
In step S306, the image of matching is determined whether, if entering step S308, otherwise into step S307;
In step S307, the image of shooting is stored in locally, and one picture number of corresponding generation recorded in database, Then it is sent to server and sends unknown personnel's alarm, warning message includes picture, picture number, acquisition time.Subsequently into step Rapid S308;
In step S308, judge whether to get personnel's more new command that server is sent, in this way into step S309, otherwise enter Enter step S310;
In step S309, the information sended over according to server(Including picture number, personnel's name), change local picture pair The personnel's title answered, subsequently into step S310;
In step S310, determine whether to exit service routine, if into step S311, otherwise return to step S304;
Flow ends at step S311.
Experiment, chooses 60 volunteers and takes 20 people as unknown personnel at random, 40 people are tested respectively as known people Card, accuracy rate 100%.
Tested after the identity of the above persons is exchanged again, accuracy rate still reaches 100%.
Citing described above for best mode for carrying out the invention, wherein the part do not addressed in detail is that this area is common The common knowledge of technical staff.Protection scope of the present invention is defined by the content of claim, any technology based on the present invention The equivalent transformation for enlightening and carrying out, also within protection scope of the present invention.

Claims (8)

1. a kind of utilization mobile client realizes the long-range control method of real-time anti-theft, it is characterised in that including server controls Step.
2. long-range control method as claimed in claim 1, it is characterised in that server controls step includes:
Start from S101, in step S102, server, which enters, monitors solicited status, waits and comes IMAQ terminal, mobile client End and spontaneous request;
Receive and enter step S103 after request;
In step S103, judge whether request is unknown personnel's alarm request from intelligent acquisition equipment, if entering step Rapid S104, otherwise into S106;
In step S104, by warning message(Facial image, time, the numbering of image including unknown personnel)It is written to database In, subsequently into step S105;
In step S105, by warning message(Facial image, time, the numbering of image including unknown personnel)It is sent to movement Client, subsequently into step S109;
In step s 106, the request from mobile client mark known people image is determined whether, if into S107, otherwise into S109;
In step s 107, the solicited message submitted according to mobile client(Including picture number, user-defined name) Image personnel's title in database is changed, then into step S108;
In step S108, identification notification is sent(The corresponding name of personnel in numbering, image including image)To face collection Smart machine, subsequently into step S109;
In step S109, determine whether to exit service routine, be then to enter step S110, otherwise into step S102;
End at step S110.
3. long-range control method as claimed in claim 1, it is characterised in that including mobile client rate-determining steps.
4. long-range control method as claimed in claim 3, it is characterised in that mobile client rate-determining steps include:
Start from S201, in step S202, set up length with server and be connected, can be immediately transmitted to move when server has notice Dynamic client;
Subsequently into step S203, in step S203, the instruction that server is sent is monitored;
Receive and enter step S204 after instruction;
In step S204, whether be unknown personnel notify, if into step S205, otherwise entering step if judging the instruction received Rapid S210;
In step S205, according to the unknown personnel's announcement information received(Including unknown personnel's facial image, picture number, adopt The collection time), the image and acquisition time of personnel is shown, subsequently into step S206;
In step S206, by user judge display image whether be understanding personnel, if into step S208, otherwise entering Enter step S207;
In step S208, user inputs the personnel's title shown in picture according to man-machine interface, subsequently into step S209;
In step S209, the title and the numbering of image that user is inputted are uploaded onto the server, subsequently into step S210;
In step S207, user can determine alarm or notifying cell security personnel according to own situation, subsequently into step S210;
In step S210, determine whether to exit service routine, if yes then enter step S211, otherwise return to step S203;
End at step S211.
5. long-range control method as claimed in claim 1, it is characterised in that gather smart machine rate-determining steps including face.
6. long-range control method as claimed in claim 5, it is characterised in that face collection smart machine rate-determining steps include:
Start from step S301;
In step s 302, the known list and facial image of download server record, subsequently into step S303;
In step S303, by the list got and picture record into local database, subsequently into step S304;
In step S304, using camera shooting image, subsequently into step S305;
In step S305, contrasted one by one according to the realtime graphic photographed and the picture that is locally stored, subsequently into step S306;
In step S306, the image of matching is determined whether, if entering step S308, otherwise into step S307;
In step S307, the image of shooting is stored in locally, and one picture number of corresponding generation recorded in database, Then it is sent to server and sends unknown personnel's alarm, warning message includes picture, picture number, acquisition time;
Subsequently into step S308;
In step S308, judge whether to get personnel's more new command that server is sent, in this way into step S309, otherwise enter Enter step S310;
In step S309, the information sended over according to server(Including picture number, personnel's name), change local picture pair The personnel's title answered, subsequently into step S310;
In step S310, determine whether to exit service routine, if into step S311, otherwise return to step S304;
End at step S311.
7. realize the device of the long-range control method as described in claim 1-6, it is characterised in that it is whole that the device includes IMAQ End, server, mobile client.
8. device as claimed in claim 7, it is characterised in that IMAQ terminal is the terminal of an Android system, terminal It can be connected containing Wifi modules by home wireless router with server, for obtaining the known people of storage from server List and image, and preserve;The equipment can be recognized equipped with a small-sized camera with real-time capture image from image Go out face and the facial image with being stored is compared, if the picture not matched, server alarm can be sent the images to;
Server includes face storage system, for storing known people list and the unknown personnel's image alarm of reception and pushing to Mobile client.
CN201710339761.3A 2017-05-15 2017-05-15 A kind of utilization mobile client realizes the long-range control method of real-time anti-theft Pending CN107146350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710339761.3A CN107146350A (en) 2017-05-15 2017-05-15 A kind of utilization mobile client realizes the long-range control method of real-time anti-theft

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710339761.3A CN107146350A (en) 2017-05-15 2017-05-15 A kind of utilization mobile client realizes the long-range control method of real-time anti-theft

Publications (1)

Publication Number Publication Date
CN107146350A true CN107146350A (en) 2017-09-08

Family

ID=59777048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710339761.3A Pending CN107146350A (en) 2017-05-15 2017-05-15 A kind of utilization mobile client realizes the long-range control method of real-time anti-theft

Country Status (1)

Country Link
CN (1) CN107146350A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977657A (en) * 2017-12-29 2018-05-01 佛山市幻云科技有限公司 Long distance monitoring method, terminal and system
CN108257344A (en) * 2018-01-31 2018-07-06 深圳春沐源控股有限公司 Method for safety monitoring, device, security facilities and system
CN112399135A (en) * 2019-07-30 2021-02-23 广东工业大学 Household monitoring device and method based on intelligent trolley
CN116828029A (en) * 2023-08-31 2023-09-29 飞天诚信科技股份有限公司 Realization method and system supporting screen-warming mode and remote control

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826226A (en) * 2010-04-30 2010-09-08 中山大学 Intelligent entrance guard control method and device
CN103714648A (en) * 2013-12-06 2014-04-09 乐视致新电子科技(天津)有限公司 Monitoring and early warning method and device
CN204650695U (en) * 2015-04-01 2015-09-16 黄波 The removable special toy dog of intelligence and safety defense monitoring system
CN105607504A (en) * 2016-03-15 2016-05-25 美的集团股份有限公司 Intelligent home system, and intelligent home control apparatus and method
CN105629940A (en) * 2016-03-01 2016-06-01 惠州Tcl移动通信有限公司 Intelligent household system capable of real-time display and access control and realization method thereof
US9589181B2 (en) * 2013-02-28 2017-03-07 Hitachi Kokusai Electric Inc. Person search method and device for searching person staying on platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826226A (en) * 2010-04-30 2010-09-08 中山大学 Intelligent entrance guard control method and device
US9589181B2 (en) * 2013-02-28 2017-03-07 Hitachi Kokusai Electric Inc. Person search method and device for searching person staying on platform
CN103714648A (en) * 2013-12-06 2014-04-09 乐视致新电子科技(天津)有限公司 Monitoring and early warning method and device
CN204650695U (en) * 2015-04-01 2015-09-16 黄波 The removable special toy dog of intelligence and safety defense monitoring system
CN105629940A (en) * 2016-03-01 2016-06-01 惠州Tcl移动通信有限公司 Intelligent household system capable of real-time display and access control and realization method thereof
CN105607504A (en) * 2016-03-15 2016-05-25 美的集团股份有限公司 Intelligent home system, and intelligent home control apparatus and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977657A (en) * 2017-12-29 2018-05-01 佛山市幻云科技有限公司 Long distance monitoring method, terminal and system
CN108257344A (en) * 2018-01-31 2018-07-06 深圳春沐源控股有限公司 Method for safety monitoring, device, security facilities and system
CN112399135A (en) * 2019-07-30 2021-02-23 广东工业大学 Household monitoring device and method based on intelligent trolley
CN116828029A (en) * 2023-08-31 2023-09-29 飞天诚信科技股份有限公司 Realization method and system supporting screen-warming mode and remote control
CN116828029B (en) * 2023-08-31 2023-12-05 飞天诚信科技股份有限公司 Realization method and system supporting screen-warming mode and remote control

Similar Documents

Publication Publication Date Title
CN107146350A (en) A kind of utilization mobile client realizes the long-range control method of real-time anti-theft
CN205230242U (en) Intelligent residential district security protection system
CN105905072A (en) Electric vehicle safety control system capable of self-detecting electric quantity of battery
CN101511085A (en) Method and apparatus for limiting usage of mobile terminal function by using personal identification
CN110414699A (en) A kind of hotel occupancy method and system, computer readable storage medium
CN106447873A (en) 5G base station on-line management system based on Internet of Things
CN105282700A (en) Tracking method, tracking server, and tracking system
CN104902119A (en) Deaf-mute alarm help-seeking system
CN204488730U (en) A kind of anti-theft electric motor car based on face identification system
CN105872466A (en) Alarm method and alarm device based on smart TV
CN205264026U (en) A key alarm system based on mobile intelligent Terminal
CN102984411A (en) Methods for protecting personal safety and property safety by smart mobile device
CN112153571A (en) Electronic equipment and equipment retrieval system thereof
CN110969718A (en) Control method and system of intelligent patrol robot
CN207558178U (en) An a kind of key alarm system based on vehicle-mounted station section board
CN111489276B (en) Personnel management method and related device
CN210377737U (en) Video-based anti-theft alarm system
CN111372197B (en) Early warning method and related device
CN105185017A (en) Family security system based on infrared induction and method thereof
CN112202516A (en) Drowning prevention dissuasion education system
CN113012325A (en) Control method, system, terminal and storage medium of ultrasonic access control
CN204990580U (en) Household security system based on infrared induction
CN105577740A (en) Vehicle state information transmission method and device
CN218350998U (en) Intelligent patrol alarm system
CN213844318U (en) Taxi face recognition security system based on cloud service platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908