CN107860097A - Security-protecting and monitoring method, device and the air-conditioning with the device - Google Patents
Security-protecting and monitoring method, device and the air-conditioning with the device Download PDFInfo
- Publication number
- CN107860097A CN107860097A CN201710849693.5A CN201710849693A CN107860097A CN 107860097 A CN107860097 A CN 107860097A CN 201710849693 A CN201710849693 A CN 201710849693A CN 107860097 A CN107860097 A CN 107860097A
- Authority
- CN
- China
- Prior art keywords
- identity
- detection pattern
- invasion personnel
- invasion
- time threshold
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides a kind of security-protecting and monitoring method, device and the air-conditioning with the device.Wherein security-protecting and monitoring method includes:Image acquisition step, for obtaining the image information in monitoring range;Intrusion detection step, for setting selection intrusion detection pattern according to user's setting or system, judge whether environment is abnormal in monitoring range;Intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;Common detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of acquisition, is judged as environmental abnormality in the case where there is invasion personnel appearance;Stranger's detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of acquisition, in the case where there is invasion personnel appearance, judges whether environment is abnormal according to the identity of invasion personnel.Technical scheme can long-range checking monitoring image, rational intrusion detection pattern may be selected, more intelligently identify invasion personnel, make Environmental security more secure.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of security-protecting and monitoring method, device and the sky with the device
Adjust.
Background technology
With intelligentized development, the intelligent Application of household electrical appliance is also more and more extensive, for example, air-conditioning carrying image is known
Other technology can detect age bracket, automatically old man or these colonies for being not suitable for blowing of child is carried out avoiding sweeping wind, is not easy to suffer from
Air conditioner disease.In addition, because being fixed on for a long time in family, air-conditioning can also carry camera device and indoor scene is monitored air-conditioning
Realize security protection.In correlation technique, human body intrusion detecting typically is used, no matter who, which enters, alarms, not enough intelligently, wrong report
Rate is higher, can be made troubles under normal circumstances to user, Consumer's Experience is poor.
The content of the invention
The defects of it is a primary object of the present invention to overcome above-mentioned prior art, there is provided a kind of security-protecting and monitoring method, dress
Put and with the device air-conditioning, with solve the problems, such as safety monitoring it is intelligent it is poor, rate of false alarm is high.
One aspect of the present invention provides a kind of security-protecting and monitoring method, including:Image acquisition step, for obtaining monitoring range
Interior image information;Intrusion detection step, for setting selection intrusion detection pattern according to user's setting or system, judge to monitor
In the range of environment it is whether abnormal;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;It is described general
Logical detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, is there is invasion personnel
It is judged as environmental abnormality in the case of appearance;Stranger's detection pattern detects monitoring model according to the image information of the acquisition
Whether there is invasion personnel appearance in enclosing, in the case where there is invasion personnel appearance, ring is judged according to the identity of the invasion personnel
Whether border is abnormal.
Alternatively, the common detection pattern includes:Judgment step, supervised for being detected according to the image information of the acquisition
Whether there is invasion personnel appearance in the range of control, be judged as environmental abnormality in the case where there is invasion personnel appearance;Step is prompted, is used
When abnormal prompt information is being provided in the case of being judged as environmental abnormality and/or is persistently recording a video default very first time threshold value
Between.
Alternatively, the common detection pattern also includes:The very first time threshold value after environmental abnormality is judged as
Within time, if occurring being judged as no longer providing abnormal prompt information in the case of environmental abnormality again and not interrupting video recording.
Alternatively, stranger's detection pattern also includes the identity for judging the invasion personnel;The invasion personnel's
Identity includes accredited members' identity and non-registered member identities;The identity for judging the invasion personnel includes:People will be invaded
Member's information is matched with the accredited members' information to prestore by recognition of face, in the case where the match is successful by the invasion people
The identity of member is judged as accredited members' identity, is judged as the identity of the invasion personnel in the case of matching is unsuccessful
The non-registered member identities.
Alternatively, in addition to by electronic equipment facial image is obtained, face is carried out by the facial image of the acquisition
The successful personnel of the face registration are confirmed as accredited members' identity by registration.
Alternatively, stranger's detection pattern also includes:Image processing step, for being believed according to the image of the acquisition
Whether there is invasion personnel appearance in breath detection monitoring range, in the case where there is invasion personnel appearance, start to record a video and judge institute
State the identity of invasion personnel;Non- abnormal conditions processing step, it is all in the default second time threshold time for judging
The identity of the invasion personnel, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping performing
The security-protecting and monitoring method;Abnormal conditions processing step, for judge it is all within the default second time threshold time
The invasion personnel identity be the non-registered member identities in the case of, provide abnormal prompt information;By described
After second time threshold time, the non-abnormal conditions processing step and the abnormal conditions processing step are re-executed.
Alternatively, in addition to:Often pass through after the default 3rd time threshold time, stop this and record a video and restart
Video recording;3rd time threshold is more than second time threshold.
Alternatively, in addition to:If monitored within the default 3rd time threshold time the non-registered member leave and
Do not return, then no longer provide abnormal prompt information;3rd time threshold is more than second time threshold.
Alternatively, the abnormal prompt information that provides includes:Abnormal prompt information is shown by display device, passes through audio
Equipment sends abnormal prompt sound, and/or provides abnormal prompt information by warning lamp;And/or by abnormal prompt information, scene
Sound and/or scene image information are sent to electronic equipment, and the electronic equipment includes terminal and/or server, the terminal
Including mobile terminal, notebook computer or desktop computer.
Alternatively, in addition to:Start to perform by electronic equipment control or stop performing the security-protecting and monitoring method, pass through
Electronic equipment controls whether to provide abnormal prompt information, and/or starts to record a video by electronic equipment control or stop recording a video;It is described
Electronic equipment includes terminal and/or server, and the terminal includes mobile terminal, notebook computer or desktop computer.
Another aspect of the present invention provides a kind of security monitoring device again, including:Image acquisition unit, supervised for obtaining
Image information in the range of control;Intrusion detecting unit, for setting selection intrusion detection pattern according to user's setting or system, sentence
Whether environment is abnormal in disconnected monitoring range;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;
The common detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, have into
Invade in the case that personnel occur and be judged as environmental abnormality;Stranger's detection pattern detects according to the image information of the acquisition
Whether invasion personnel appearance is had in monitoring range, in the case where there is invasion personnel appearance, according to the identity of the invasion personnel
Judge whether environment is abnormal.
Alternatively, the common detection pattern includes:Judgment sub-unit, for being detected according to the image information of the acquisition
Whether there is invasion personnel appearance in monitoring range, be judged as environmental abnormality in the case where there is invasion personnel appearance;Prompting is single
Member, for providing abnormal prompt information in the case where being judged as environmental abnormality and/or default very first time threshold of persistently recording a video
It is worth the time.
Alternatively, the common detection pattern also includes:The very first time threshold value after environmental abnormality is judged as
Within time, if occurring being judged as no longer providing abnormal prompt information in the case of environmental abnormality again and not interrupting video recording.
Alternatively, stranger's detection pattern includes identity judgment sub-unit;The identity of the invasion personnel includes note
Volume member identities and non-registered member identities;The identity judgment sub-unit is used for:The registration that personal information will be invaded and prestored
Information about firms is matched by recognition of face, is judged as the identity of the invasion personnel in the case where the match is successful described
Accredited members' identity, the identity of the invasion personnel is judged as non-registered member's body in the case of matching is unsuccessful
Part.
Alternatively, in addition to registering unit, it is used for:Facial image is obtained by electronic equipment, passes through the people of the acquisition
Face image carries out face registration, and the successful personnel of the face registration are confirmed as into accredited members' identity.
Alternatively, stranger's detection pattern also includes:Image procossing subelement, for the image according to the acquisition
Whether there is invasion personnel appearance in infomation detection monitoring range, in the case where there is invasion personnel appearance, start to record a video and judge
The identity of the invasion personnel;Non- abnormal conditions handle subelement, for judging the institute in the default second time threshold time
The identity for the invasion personnel having, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping
Perform the function performed by the security monitoring device;Abnormal conditions handle subelement, for judge it is all default
In the case that the identity of the invasion personnel in second time threshold time is the non-registered member identities, exception is provided
Prompt message;After the second time threshold time, the non-abnormal conditions processing subelement and described is re-executed
Function performed by abnormal conditions processing subelement.
Alternatively, described image processing subelement is additionally operable to:Often pass through after the default 3rd time threshold time, stop
This is recorded a video and restarts to record a video;3rd time threshold is more than second time threshold.
Alternatively, the non-abnormal conditions processing subelement is additionally operable to:If supervised within the default 3rd time threshold time
Measure the non-registered member to leave and do not return, then no longer provide abnormal prompt information;3rd time threshold is more than institute
State the second time threshold.
Alternatively, the abnormal prompt information that provides includes:Abnormal prompt information is shown by display device, passes through audio
Equipment sends abnormal prompt sound, and/or provides abnormal prompt information by warning lamp;And/or by abnormal prompt information, scene
Sound and/or scene image information are sent to electronic equipment, and the electronic equipment includes terminal and/or server, the terminal
Including mobile terminal, notebook computer or desktop computer.
Alternatively, in addition to:Start to perform by electronic equipment control or stop the execution security monitoring device and held
Capable function, by electronic equipment control whether to provide abnormal prompt information, and/or by electronic equipment control start video recording or
Stop video recording;The electronic equipment includes terminal and/or server, and the terminal includes mobile terminal, notebook computer or platform
Formula computer.
Another aspect of the present invention provides a kind of air-conditioning again, has the device described in any of the above-described.
Technical scheme can remotely in checking monitoring scope scene image, rational invasion can be selected by user
Detection pattern, invasion personnel are more intelligently identified, the reliability of monitoring is improved, makes Environmental security more secure.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the present invention, this hair
Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the general frame figure of security-protecting and monitoring method provided by the invention;
Fig. 2 is a kind of step flow of preferred embodiment of the common detection pattern of security-protecting and monitoring method provided by the invention
Figure;
The step of Fig. 3 is a kind of preferred embodiment of stranger's detection pattern of security-protecting and monitoring method provided by the invention is flowed
Cheng Tu;
Fig. 4 is the communication connection flow chart of security-protecting and monitoring method provided by the invention;
Fig. 5 is the overall structure figure of security monitoring device provided by the invention;
Fig. 6 is a kind of structural representation of preferred embodiment of security monitoring device provided by the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and
Technical solution of the present invention is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the present invention one
Section Example, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing
Go out under the premise of creative work the every other embodiment obtained, belong to the scope of protection of the invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use
Data can exchange in the appropriate case, so as to embodiments of the invention described herein can with except illustrating herein or
Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment
Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product
Or the intrinsic other steps of equipment or unit.
One aspect of the present invention provides a kind of security-protecting and monitoring method.Fig. 1 is the whole of security-protecting and monitoring method provided by the invention
Body frame diagram.As shown in figure 1, security-protecting and monitoring method of the present invention includes:Step S110, image acquisition step, monitored for obtaining
In the range of image information;Step S120, intrusion detection step, for setting selection intrusion detection according to user's setting or system
Pattern, judge whether environment is abnormal in monitoring range;The intrusion detection pattern includes common detection pattern and/or stranger examines
Survey pattern;Whether the common detection pattern is detected in monitoring range according to the image information of the acquisition has invasion personnel to go out
It is existing, it is judged as environmental abnormality in the case where there is invasion personnel appearance;Stranger's detection pattern is according to the figure of the acquisition
As whether there is invasion personnel appearance in infomation detection monitoring range, in the case where there is invasion personnel appearance, according to the invasion
The identity of personnel judges whether environment is abnormal.
Above-mentioned common detection pattern (being based on human testing, be identified using head and shoulder model) and stranger's detection pattern
Respectively there are advantage and disadvantage (based on Face datection and human testing).As long as someone occurs to be judged as that environment is different in common detection pattern
Often, it is that rate of failing to report is low, shortcoming is rate of false alarm height the advantages of this pattern;Can be according to the body of invasion personnel in stranger's detection pattern
It is part whether abnormal to differentiate environment, it is that rate of false alarm is low the advantages of this pattern, it is likely that rate of failing to report can be slightly higher by contrast.
User can select the intrusion detection pattern for being adapted to present case as needed, such as:Stranger's inspection may be selected in general
Survey pattern, only stranger are just judged as environmental abnormality when invading, when kinsfolk (non-stranger) occurs under normal circumstances not
Belong to abnormal conditions, so so as not to being bothered too much because of often the message of abnormal conditions is received;Needed in particular time
Common detection pattern may be selected when especially strick precaution, as long as someone occurs that environmental abnormality will be judged as, make user timely
Grasp situation, once corresponding measure can be taken in time by going wrong, better ensure that safety.System default setting can be set to general
Logical detection pattern, user can perform intrusion detection the switching of pattern by APP.
Fig. 2 is a kind of step flow of preferred embodiment of the common detection pattern of security-protecting and monitoring method provided by the invention
Figure.As shown in Fig. 2 according to a kind of embodiment of security-protecting and monitoring method of the present invention, the common detection pattern includes:Step
S210, judgment step, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, having
Invasion personnel are judged as environmental abnormality in the case of occurring;Step S220, step is prompted, for being judged as the feelings of environmental abnormality
Abnormal prompt information is provided under condition and/or default very first time threshold time of persistently recording a video.Detected in common detection pattern
Exception will be judged as to someone, this pattern can reduce rate of failing to report, it is ensured that safety.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, the common detection pattern also includes:It is being judged as
Within the very first time threshold time after environmental abnormality, if in the case of occurring being judged as environmental abnormality again no longer to
Go out abnormal prompt information and do not interrupt video recording.In this embodiment, detect that personnel leave in very first time threshold time
And situation about occurring again not PUSH message because there is video recording continuing, need not continuous repeatedly PUSH message, this implementation
Mode is more intelligent, more hommization.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, the abnormal prompt information that provides includes:By aobvious
Show that equipment shows abnormal prompt information, abnormal prompt sound is sent by audio frequency apparatus, and/or provides abnormal carry by warning lamp
Show information;And/or abnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronics is set
Standby to include terminal and/or server, the terminal includes mobile terminal, notebook computer or desktop computer.Fast side
Formula is the mobile phone PUSH message to user.
Specifically, common intrusion detection pattern is opened, camera detects whether someone in real time.Someone is detected first, then
Initiation message pushes and starts the threshold value T1 times very first time of recording a video immediately;In the T1 times, personnel leave and occurred again, do not push away
Send message (because having recorded a video for checking).After the T1 times, someone is detected, carries out message push immediately again, and is started new
Video recording;If nobody, push and record a video without message.Enter if any new personnel, repeat above-mentioned action.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, stranger's detection pattern is also included described in judgement
The identity of invasion personnel;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;The judgement institute
Stating the identity of invasion personnel includes:Invasion personal information is matched with the accredited members' information to prestore by recognition of face,
The identity of the invasion personnel is judged as accredited members' identity in the case where the match is successful, is matching unsuccessful feelings
The identity of the invasion personnel is judged as the non-registered member identities under condition.
Specifically, security monitoring device can be arranged in certain electric equipment, while user mobile phone APP end has family
Member management interface, the electric equipment that face registration and accredited members can be carried out by electric equipment or user mobile phone APP are liked
Occupation mode is set, such as air-conditioning, including accredited members like air-supply and set.
Facial image is obtained according to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to by electronic equipment,
Face registration is carried out by the facial image of the acquisition, the successful personnel of the face registration are confirmed as into accredited members' body
Part.Face registration has two kinds of implementations, and one kind is to be taken pictures registration by cell phone application, and one kind is (such as sky based on electric equipment
Adjust) local camera registered.Cell phone application logon mode is:Into after register interface, there is corresponding face template, wrap
Positive face, side face are included, cell phone application carries out self-timer face by calling mobile phone front camera and obtains its head portrait, and user refers to one by one
Face template is taken pictures and adds corresponding human face photo, and human face photo quantity is typically in 3-12, including positive face, side face.Enter
After pedestrian's face is taken pictures and determined, user can carry out individual subscriber setting in APP, including the pet name of user, sex, the age and
Like air supply pattern (temperature, wind speed, blowing wind speed) etc..Mode is locally registered in air-conditioning:User passes through air-conditioning panel, remote control
Or cell phone application starts face registration.Rear user, which is locally registered, can obtain the head portrait of registered member at cell phone application end and it is entered
Row individual subscriber is set, including the pet name of user, sex, age and hobby air supply pattern (temperature, wind speed, blowing wind speed)
Deng.
The step of Fig. 3 is a kind of preferred embodiment of stranger's detection pattern of security-protecting and monitoring method provided by the invention is flowed
Cheng Tu.As shown in figure 3, according to a kind of embodiment of security-protecting and monitoring method of the present invention, stranger's detection pattern also includes:
Step S310, image processing step, for detecting in monitoring range whether have invasion personnel according to the image information of the acquisition
Occur, in the case where there is invasion personnel appearance, start to record a video and judge the identity of the invasion personnel;Step S320, it is non-different
Reason condition processing step, for judging the identity of all invasion personnel in the default second time threshold time, if
Stop video recording in the case of wherein there are accredited members' identity and/or stop performing the security-protecting and monitoring method;Step
S330, abnormal conditions processing step, for judging all invasion people within the default second time threshold time
In the case that the identity of member is the non-registered member identities, abnormal prompt information is provided;By second time threshold
After time, the non-abnormal conditions processing step and the abnormal conditions processing step are re-executed.
Specifically, strange contrived intrusion detection pattern is opened, camera detects whether someone in real time.Once someone is detected,
Then start video recording and recognition of face immediately.In second time threshold T2 times, if matching invasion personnel as kinsfolk's (note
Volume member identities), then stop video recording immediately and message does not push.It is kinsfolk as do not matched it in the T2 times, then enters
Message pushes row first.Such as period, matching invader, then interruption video recording immediately and message push away for kinsfolk, closing security protection
Send.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to:Often pass through default 3rd time threshold
After time, stop this and record a video and restart to record a video;3rd time threshold is more than second time threshold.Specifically
Ground, whether if not matched as kinsfolk by the 3rd time threshold T3, it is family to continue to be matched in next T3 times
Member and start to record a video, such as the match is successful, then sends message and push and stop video recording and start new one end recording a video (continuously recording
Oversize inconvenience was downloaded and checked time).As do not matched kinsfolk always, the operation of the above is repeated.The T3 times need to be more than T2, T2
The time is pushed to trigger message first, message is pushed to user APP ends by guarantee immediately in the short period of time.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to:In the default 3rd time threshold time
If interior monitor that the non-registered member leaves and do not returned, abnormal prompt information is no longer provided;3rd time threshold
More than second time threshold.Specifically, as in the 3rd time threshold T3 times, non-registered member leaves and does not have,
Then stop message push.Within the T3 times, non-registered member leaves and returned, then still provides for message push and video recording.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to:Start to perform by electronic equipment control
Or stop performing the security-protecting and monitoring method, control whether to provide abnormal prompt information by electronic equipment, and/or pass through electronics
Equipment control starts to record a video or stops recording a video;The electronic equipment includes terminal and/or server, and the terminal includes mobile whole
End, notebook computer or desktop computer.The push of intrusion alarm message function can close on APP;Invading recording function can be
Closed on APP.The push of intrusion alarm message is only closed, does not influence to detect video recording during someone.
Fig. 4 is the communication connection flow chart of security-protecting and monitoring method provided by the invention.Still so that electric equipment is air-conditioning as an example,
User can enter real-time monitoring and control in APP terminals, and connection overhead is serviced by P2P (Peer to Peer, peer-to-peer network)
Image module is adjusted, realizes real-time video monitoring.Video supports ultra high-definition 1080P, high definition 720P, SD 480P and smooth 280P's
One or more, form is H.264.The communication connection flow of its unexpected message push is as shown in figure 4, cell phone application is established with air-conditioning
The process of connection is as follows:
1. cell phone application initiates logging request by the user_id of oneself to server.
2. after logging in successfully, cell phone application obtains the session token specifically logged in.
3. cell phone application is by the token of oneself, and the dev_id for the air-conditioning to be connected, P2P connection requests are initiated.
Wherein:Keeps are the servers of cell phone application account storage;Connection server is P2P servers, Ke Yitong
One server;It is that unique mac addresses (can be air-conditioning equipment or wifi module equipment to arrange device address dev_id
Mac addresses).
Another aspect of the present invention provides a kind of security monitoring device again.Fig. 5 is safety monitoring dress provided by the invention
The overall structure figure put.As shown in figure 5, security monitoring device of the present invention includes:Image acquisition unit 100, monitored for obtaining
In the range of image information;Intrusion detecting unit 200, for setting selection intrusion detection pattern according to user's setting or system,
Judge whether environment is abnormal in monitoring range;The intrusion detection pattern includes common detection pattern and/or stranger detects mould
Formula;The common detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition,
It is judged as environmental abnormality in the case of having invasion personnel appearance;Stranger's detection pattern is according to the image information of the acquisition
Whether invasion personnel appearance is had in detection monitoring range, in the case where there is invasion personnel appearance, according to the invasion personnel's
Identity judges whether environment is abnormal.
Fig. 6 is a kind of structural representation of preferred embodiment of security monitoring device provided by the invention.As shown in fig. 6,
According to a kind of embodiment of security monitoring device of the present invention, the common detection pattern includes:Judgment sub-unit 210, is used for
Whether have invasion personnel appearance, in the situation for having invasion personnel to occur if being detected according to the image information of the acquisition in monitoring range
Under be judged as environmental abnormality;Subelement 220 is prompted, for providing abnormal prompt information in the case where being judged as environmental abnormality
And/or default very first time threshold time of persistently recording a video.
According to a kind of embodiment of security monitoring device of the present invention, the common detection pattern also includes:It is being judged as
Within the very first time threshold time after environmental abnormality, if in the case of occurring being judged as environmental abnormality again no longer to
Go out abnormal prompt information and do not interrupt video recording.
According to a kind of embodiment of security monitoring device of the present invention, stranger's detection pattern includes identity and judges son
Unit 230;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;The identity judgment sub-unit
230 are used for:Invasion personal information is matched with the accredited members' information to prestore by recognition of face, in the feelings that the match is successful
The identity of the invasion personnel is judged as accredited members' identity under condition, by the invasion in the case of matching is unsuccessful
The identity of personnel is judged as the non-registered member identities.
According to a kind of embodiment of security monitoring device of the present invention, in addition to registering unit 300, it is used for:Pass through electronics
Equipment obtains facial image, face registration is carried out by the facial image of the acquisition, by the successful personnel of the face registration
Confirm as accredited members' identity.
According to a kind of embodiment of security monitoring device of the present invention, stranger's detection pattern also includes:At image
Manage subelement 240, for according to the image information of the acquisition detect monitoring range in whether have invasion personnel appearance, have into
Invade in the case that personnel occur, start to record a video and judge the identity of the invasion personnel;Non- abnormal conditions handle subelement 250,
For judging the identity of all invasion personnel in the default second time threshold time, if wherein there are the note
Stop video recording in the case of volume member identities and/or stop performing the function performed by the security monitoring device;Abnormal conditions
Subelement 260 is handled, for judging the identity of all invasion personnel within the default second time threshold time
In the case of being the non-registered member identities, abnormal prompt information is provided;After the second time threshold time,
Re-execute the non-abnormal conditions processing subelement and the function performed by abnormal conditions processing subelement.
According to a kind of embodiment of security monitoring device of the present invention, described image processing subelement 240 is additionally operable to:Often pass through
Cross after the default 3rd time threshold time, stop this and record a video and restart to record a video;3rd time threshold is more than
Second time threshold.
According to a kind of embodiment of security monitoring device of the present invention, the non-abnormal conditions processing subelement 250 is also used
In:If being monitored within the default 3rd time threshold time, the non-registered member leaves and not returned, no longer provides different
Normal prompt message;3rd time threshold is more than second time threshold.
According to a kind of embodiment of security monitoring device of the present invention, the abnormal prompt information that provides includes:By aobvious
Show that equipment shows abnormal prompt information, abnormal prompt sound is sent by audio frequency apparatus, and/or provides abnormal carry by warning lamp
Show information;And/or abnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronics is set
Standby to include terminal and/or server, the terminal includes mobile terminal, notebook computer or desktop computer.
According to a kind of embodiment of security monitoring device of the present invention, in addition to:Start to perform by electronic equipment control
Or stop performing function performed by the security monitoring device, control whether to provide abnormal prompt information by electronic equipment,
And/or start to record a video by electronic equipment control or stop recording a video;The electronic equipment includes terminal and/or server, described
Terminal includes mobile terminal, notebook computer or desktop computer.
Another aspect of the present invention provides a kind of air-conditioning again, has the device described in any of the above-described.
Technical scheme can remotely in checking monitoring scope scene image, rational invasion can be selected by user
Detection pattern, invasion personnel are more intelligently identified, the reliability of monitoring is improved, makes Environmental security more secure.
Function described herein can be implemented in hardware, by the software of computing device, firmware or its any combinations.
If implement in the software by computing device, then computer can be stored in using function as one or more instructions or code
Transmitted on readable media or via computer-readable media.Other examples and embodiment will in of the invention and appended right
Ask in the scope and spirit of book.For example, be attributed to the property of software, function described above can be used by processor,
Hardware, firmware, hardwired appoint the software implementation that the combination of whichever performs in these.In addition, each functional unit can integrate
In a processing unit or unit is individually physically present, can also two or more units be integrated in
In one unit.
In several embodiments provided herein, it should be understood that disclosed technology contents, others can be passed through
Mode is realized.Wherein, device embodiment described above is only schematical, such as the division of the unit, Ke Yiwei
A kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
Connect, can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, as control fill
The part put can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server or network equipment etc.) perform each embodiment methods described of the present invention whole or
Part steps.And foregoing storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with store program codes
Medium.
Embodiments of the invention are the foregoing is only, are not intended to limit the invention, for those skilled in the art
For member, the present invention can have various modifications and variations.Any modification within the spirit and principles of the invention, being made,
Equivalent substitution, improvement etc., should be included within scope of the presently claimed invention.
Claims (21)
- A kind of 1. security-protecting and monitoring method, it is characterised in that including:Image acquisition step, for obtaining the image information in monitoring range;Intrusion detection step, for setting selection intrusion detection pattern according to user's setting or system, judge monitoring range inner ring Whether border is abnormal;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;The common detection mould Formula detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, in the feelings for having invasion personnel to occur It is judged as environmental abnormality under condition;Stranger's detection pattern according to the image information of the acquisition detect monitoring range in whether There is invasion personnel appearance, in the case where there is invasion personnel appearance, judge whether environment is different according to the identity of the invasion personnel Often.
- 2. according to the method for claim 1, it is characterised in that the common detection pattern includes:Judgment step, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, having Invasion personnel are judged as environmental abnormality in the case of occurring;Step is prompted, for providing abnormal prompt information in the case where being judged as environmental abnormality and/or persistently recording a video default Very first time threshold time.
- 3. according to the method for claim 2, it is characterised in that the common detection pattern also includes:Within the very first time threshold time being judged as after environmental abnormality, if occurring being judged as environmental abnormality again In the case of no longer provide abnormal prompt information and do not interrupt video recording.
- 4. according to the method any one of claim 1-3, it is characterised in that stranger's detection pattern also includes sentencing The identity of the disconnected invasion personnel;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;It is described Judging the identity of the invasion personnel includes:Invasion personal information is carried out with the accredited members' information to prestore by recognition of face Matching, the identity of the invasion personnel is judged as accredited members' identity in the case where the match is successful, matching not into The identity of the invasion personnel is judged as the non-registered member identities in the case of work(.
- 5. according to the method for claim 4, it is characterised in that also include obtaining facial image by electronic equipment, pass through The facial image of the acquisition carries out face registration, and the successful personnel of the face registration are confirmed as into accredited members' identity.
- 6. the method according to claim 4 or 5, it is characterised in that stranger's detection pattern also includes:Image processing step, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, In the case where there is invasion personnel appearance, start to record a video and judge the identity of the invasion personnel;Non- abnormal conditions processing step, for judging all invasion personnel's in the default second time threshold time Identity, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping performing the safety monitoring side Method;Abnormal conditions processing step, for judging all invasion personnel within the default second time threshold time Identity be the non-registered member identities in the case of, provide abnormal prompt information;After the second time threshold time, the non-abnormal conditions processing step and the abnormal conditions are re-executed Processing step.
- 7. according to the method for claim 6, it is characterised in that also include:Often pass through the default 3rd time threshold time Afterwards, stop this recording a video and restart to record a video;3rd time threshold is more than second time threshold.
- 8. the method according to claim 6 or 7, it is characterised in that also include:Within the default 3rd time threshold time If monitoring, the non-registered member leaves and not returned, no longer provides abnormal prompt information;3rd time threshold is big In second time threshold.
- 9. according to the method any one of claim 2-8, it is characterised in that the abnormal prompt information that provides includes:Abnormal prompt information is shown by display device, abnormal prompt sound is sent by audio frequency apparatus, and/or passes through warning lamp Provide abnormal prompt information;And/orAbnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronic equipment is included eventually End and/or server, the terminal include mobile terminal, notebook computer or desktop computer.
- 10. according to the method any one of claim 1-9, it is characterised in that also include:Opened by electronic equipment control Begin to perform or stop performing the security-protecting and monitoring method, control whether to provide abnormal prompt information, and/or lead to by electronic equipment Electronic equipment control is crossed to start to record a video or stop recording a video;The electronic equipment includes terminal and/or server, and the terminal includes Mobile terminal, notebook computer or desktop computer.
- A kind of 11. security monitoring device, it is characterised in that including:Image acquisition unit, for obtaining the image information in monitoring range;Intrusion detecting unit, for setting selection intrusion detection pattern according to user's setting or system, judge monitoring range inner ring Whether border is abnormal;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;The common detection mould Formula detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, in the feelings for having invasion personnel to occur It is judged as environmental abnormality under condition;Stranger's detection pattern according to the image information of the acquisition detect monitoring range in whether There is invasion personnel appearance, in the case where there is invasion personnel appearance, judge whether environment is different according to the identity of the invasion personnel Often.
- 12. device according to claim 11, it is characterised in that the common detection pattern includes:Judgment sub-unit, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, It is judged as environmental abnormality in the case of having invasion personnel appearance;Subelement is prompted, it is default for providing abnormal prompt information and/or lasting video recording in the case where being judged as environmental abnormality Very first time threshold time.
- 13. device according to claim 12, it is characterised in that the common detection pattern also includes:Within the very first time threshold time being judged as after environmental abnormality, if occurring being judged as environmental abnormality again In the case of no longer provide abnormal prompt information and do not interrupt video recording.
- 14. according to the device any one of claim 11-13, it is characterised in that stranger's detection pattern includes Identity judgment sub-unit;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;The identity is sentenced Disconnected subelement is used for:Will invasion personal information matched with the accredited members' information to prestore by recognition of face, match into The identity of the invasion personnel is judged as accredited members' identity in the case of work(, by institute in the case of matching is unsuccessful The identity for stating invasion personnel is judged as the non-registered member identities.
- 15. device according to claim 14, it is characterised in that also including registering unit, be used for:Obtained by electronic equipment Facial image is taken, face registration is carried out by the facial image of the acquisition, the successful personnel of the face registration are confirmed as Accredited members' identity.
- 16. the device according to claims 14 or 15, it is characterised in that stranger's detection pattern also includes:Image procossing subelement, whether there are invasion personnel to go out for being detected according to the image information of the acquisition in monitoring range It is existing, in the case where there is invasion personnel appearance, start to record a video and judge the identity of the invasion personnel;Non- abnormal conditions handle subelement, for judging all invasion personnel in the default second time threshold time Identity, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping performing the safety monitoring Function performed by device;Abnormal conditions handle subelement, for judging all invasion people within the default second time threshold time In the case that the identity of member is the non-registered member identities, abnormal prompt information is provided;After the second time threshold time, the non-abnormal conditions processing subelement and the abnormal feelings are re-executed Function performed by condition processing subelement.
- 17. device according to claim 16, it is characterised in that described image processing subelement is additionally operable to:Often by pre- If the 3rd time threshold time after, stop this and record a video and restart to record a video;3rd time threshold is more than described Second time threshold.
- 18. the device according to claim 16 or 17, it is characterised in that the non-abnormal conditions processing subelement is also used In:If being monitored within the default 3rd time threshold time, the non-registered member leaves and not returned, no longer provides different Normal prompt message;3rd time threshold is more than second time threshold.
- 19. according to the device any one of claim 12-18, it is characterised in that described to provide abnormal prompt packet Include:Abnormal prompt information is shown by display device, abnormal prompt sound is sent by audio frequency apparatus, and/or passes through warning lamp Provide abnormal prompt information;And/orAbnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronic equipment is included eventually End and/or server, the terminal include mobile terminal, notebook computer or desktop computer.
- 20. according to the device any one of claim 11-19, it is characterised in that also include:Controlled by electronic equipment Start to perform or stop performing function performed by the security monitoring device, control whether to provide abnormal carry by electronic equipment Show information, and/or start to record a video by electronic equipment control or stop recording a video;The electronic equipment includes terminal and/or service Device, the terminal include mobile terminal, notebook computer or desktop computer.
- 21. a kind of air-conditioning, it is characterised in that there is the device as any one of claim 11-20.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710849693.5A CN107860097A (en) | 2017-09-20 | 2017-09-20 | Security-protecting and monitoring method, device and the air-conditioning with the device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710849693.5A CN107860097A (en) | 2017-09-20 | 2017-09-20 | Security-protecting and monitoring method, device and the air-conditioning with the device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107860097A true CN107860097A (en) | 2018-03-30 |
Family
ID=61699477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710849693.5A Pending CN107860097A (en) | 2017-09-20 | 2017-09-20 | Security-protecting and monitoring method, device and the air-conditioning with the device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107860097A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326082A (en) * | 2018-09-30 | 2019-02-12 | 珠海格力电器股份有限公司 | Security-protecting and monitoring method, device, system, server and air-conditioning |
CN110686353A (en) * | 2019-09-26 | 2020-01-14 | 珠海格力电器股份有限公司 | Image control method and device, storage medium and air conditioner |
CN110796015A (en) * | 2019-09-27 | 2020-02-14 | 深圳市大拿科技有限公司 | Remote monitoring method and device |
CN111815887A (en) * | 2020-07-16 | 2020-10-23 | 深圳鞠慈云科技有限公司 | Security warning system |
CN113037842A (en) * | 2021-03-09 | 2021-06-25 | 国网山东省电力公司庆云县供电公司 | Remote maintenance system of substation automation system |
CN113112721A (en) * | 2021-04-21 | 2021-07-13 | 阳光三星(合肥)储能电源有限公司 | Energy storage system anti-theft method and application device |
CN114360230A (en) * | 2021-09-24 | 2022-04-15 | 深圳市卡联科技股份有限公司 | Bus safety early warning method, system, device and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013109440A (en) * | 2011-11-18 | 2013-06-06 | Tsukamoto Musen:Kk | Security camera apparatus |
CN103731598A (en) * | 2012-10-12 | 2014-04-16 | 中兴通讯股份有限公司 | Intelligent monitoring terminal and video monitoring method |
JP2014229097A (en) * | 2013-05-23 | 2014-12-08 | 三菱電機株式会社 | Air conditioner equipped with monitoring function |
CN104243896A (en) * | 2013-06-17 | 2014-12-24 | 鸿富锦精密工业(深圳)有限公司 | Smart television monitoring anti-theft method and system |
CN104902242A (en) * | 2015-06-04 | 2015-09-09 | 广东美的制冷设备有限公司 | Anti-theft monitoring air conditioner and monitoring method for air conditioner |
CN105611248A (en) * | 2015-12-25 | 2016-05-25 | 北京奇虎科技有限公司 | Monitoring method, device and system based on camera |
CN106152425A (en) * | 2016-08-31 | 2016-11-23 | 芜湖美智空调设备有限公司 | Security-protecting and monitoring method based on air-conditioning and air-conditioner |
CN106373312A (en) * | 2016-08-27 | 2017-02-01 | 桂林信通科技有限公司 | Safety protection method and system based on air-conditioner |
-
2017
- 2017-09-20 CN CN201710849693.5A patent/CN107860097A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013109440A (en) * | 2011-11-18 | 2013-06-06 | Tsukamoto Musen:Kk | Security camera apparatus |
CN103731598A (en) * | 2012-10-12 | 2014-04-16 | 中兴通讯股份有限公司 | Intelligent monitoring terminal and video monitoring method |
JP2014229097A (en) * | 2013-05-23 | 2014-12-08 | 三菱電機株式会社 | Air conditioner equipped with monitoring function |
CN104243896A (en) * | 2013-06-17 | 2014-12-24 | 鸿富锦精密工业(深圳)有限公司 | Smart television monitoring anti-theft method and system |
CN104902242A (en) * | 2015-06-04 | 2015-09-09 | 广东美的制冷设备有限公司 | Anti-theft monitoring air conditioner and monitoring method for air conditioner |
CN105611248A (en) * | 2015-12-25 | 2016-05-25 | 北京奇虎科技有限公司 | Monitoring method, device and system based on camera |
CN106373312A (en) * | 2016-08-27 | 2017-02-01 | 桂林信通科技有限公司 | Safety protection method and system based on air-conditioner |
CN106152425A (en) * | 2016-08-31 | 2016-11-23 | 芜湖美智空调设备有限公司 | Security-protecting and monitoring method based on air-conditioning and air-conditioner |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326082A (en) * | 2018-09-30 | 2019-02-12 | 珠海格力电器股份有限公司 | Security-protecting and monitoring method, device, system, server and air-conditioning |
CN109326082B (en) * | 2018-09-30 | 2021-05-07 | 珠海格力电器股份有限公司 | Security monitoring method, device, system, server and air conditioner |
CN110686353A (en) * | 2019-09-26 | 2020-01-14 | 珠海格力电器股份有限公司 | Image control method and device, storage medium and air conditioner |
CN110796015A (en) * | 2019-09-27 | 2020-02-14 | 深圳市大拿科技有限公司 | Remote monitoring method and device |
CN111815887A (en) * | 2020-07-16 | 2020-10-23 | 深圳鞠慈云科技有限公司 | Security warning system |
CN113037842A (en) * | 2021-03-09 | 2021-06-25 | 国网山东省电力公司庆云县供电公司 | Remote maintenance system of substation automation system |
CN113037842B (en) * | 2021-03-09 | 2022-11-01 | 国网山东省电力公司庆云县供电公司 | Remote maintenance system of substation automation system |
CN113112721A (en) * | 2021-04-21 | 2021-07-13 | 阳光三星(合肥)储能电源有限公司 | Energy storage system anti-theft method and application device |
CN114360230A (en) * | 2021-09-24 | 2022-04-15 | 深圳市卡联科技股份有限公司 | Bus safety early warning method, system, device and storage medium |
CN114360230B (en) * | 2021-09-24 | 2024-02-02 | 深圳市卡联科技股份有限公司 | Bus safety early warning method, system, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107860097A (en) | Security-protecting and monitoring method, device and the air-conditioning with the device | |
US11785146B2 (en) | Doorbell call center | |
CN108198292B (en) | Household monitoring method and system based on intelligent cloud lock | |
US10522013B2 (en) | Street watch | |
US10769645B2 (en) | Method and device for calculating customer traffic volume | |
CN107341880A (en) | A kind of home security method and system | |
US8520072B1 (en) | Video monitoring and alarm verification technology | |
WO2017118182A1 (en) | Terminal and operation method therefor | |
CN107592498A (en) | A kind of cell management method and relevant device based on intelligent video camera head | |
CN205080681U (en) | Register one's residence door electronic monitoring device | |
CN111757069B (en) | Monitoring anti-theft method and device based on intelligent doorbell | |
CN113284274A (en) | Trailing identification method and computer readable storage medium | |
US20190068924A1 (en) | Monitoring system having personal information protection function and method thereof | |
CN110766849A (en) | Method, device, equipment and medium for automatically identifying foreign personnel by community access control | |
CN107131607A (en) | Monitoring method, device, system and air-conditioning based on air-conditioning | |
CN105872466A (en) | Alarm method and alarm device based on smart TV | |
CN114898443A (en) | Face data acquisition method and device | |
CN107292208B (en) | Anti-theft method and device for mobile terminal | |
CN107729798A (en) | Banister control method, system and computer-readable recording medium | |
CN105100125B (en) | A kind of dormancy control method of virtual desktop, apparatus and system | |
CN106448013A (en) | Smart theft prevention apparatus | |
WO2018106437A2 (en) | Street watch | |
WO2022227528A1 (en) | Air conditioner control method and system, and air conditioner | |
CN108564750A (en) | Security alarm method, apparatus and household appliance | |
CN112804492A (en) | Communication prompting method and device for electronic cat eye |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180330 |
|
RJ01 | Rejection of invention patent application after publication |