CN107860097A - Security-protecting and monitoring method, device and the air-conditioning with the device - Google Patents

Security-protecting and monitoring method, device and the air-conditioning with the device Download PDF

Info

Publication number
CN107860097A
CN107860097A CN201710849693.5A CN201710849693A CN107860097A CN 107860097 A CN107860097 A CN 107860097A CN 201710849693 A CN201710849693 A CN 201710849693A CN 107860097 A CN107860097 A CN 107860097A
Authority
CN
China
Prior art keywords
identity
detection pattern
invasion personnel
invasion
time threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710849693.5A
Other languages
Chinese (zh)
Inventor
刘光有
毛跃辉
梁博
王子
郑文成
王慧君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201710849693.5A priority Critical patent/CN107860097A/en
Publication of CN107860097A publication Critical patent/CN107860097A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a kind of security-protecting and monitoring method, device and the air-conditioning with the device.Wherein security-protecting and monitoring method includes:Image acquisition step, for obtaining the image information in monitoring range;Intrusion detection step, for setting selection intrusion detection pattern according to user's setting or system, judge whether environment is abnormal in monitoring range;Intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;Common detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of acquisition, is judged as environmental abnormality in the case where there is invasion personnel appearance;Stranger's detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of acquisition, in the case where there is invasion personnel appearance, judges whether environment is abnormal according to the identity of invasion personnel.Technical scheme can long-range checking monitoring image, rational intrusion detection pattern may be selected, more intelligently identify invasion personnel, make Environmental security more secure.

Description

Security-protecting and monitoring method, device and the air-conditioning with the device
Technical field
The present invention relates to electronic technology field, more particularly to a kind of security-protecting and monitoring method, device and the sky with the device Adjust.
Background technology
With intelligentized development, the intelligent Application of household electrical appliance is also more and more extensive, for example, air-conditioning carrying image is known Other technology can detect age bracket, automatically old man or these colonies for being not suitable for blowing of child is carried out avoiding sweeping wind, is not easy to suffer from Air conditioner disease.In addition, because being fixed on for a long time in family, air-conditioning can also carry camera device and indoor scene is monitored air-conditioning Realize security protection.In correlation technique, human body intrusion detecting typically is used, no matter who, which enters, alarms, not enough intelligently, wrong report Rate is higher, can be made troubles under normal circumstances to user, Consumer's Experience is poor.
The content of the invention
The defects of it is a primary object of the present invention to overcome above-mentioned prior art, there is provided a kind of security-protecting and monitoring method, dress Put and with the device air-conditioning, with solve the problems, such as safety monitoring it is intelligent it is poor, rate of false alarm is high.
One aspect of the present invention provides a kind of security-protecting and monitoring method, including:Image acquisition step, for obtaining monitoring range Interior image information;Intrusion detection step, for setting selection intrusion detection pattern according to user's setting or system, judge to monitor In the range of environment it is whether abnormal;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;It is described general Logical detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, is there is invasion personnel It is judged as environmental abnormality in the case of appearance;Stranger's detection pattern detects monitoring model according to the image information of the acquisition Whether there is invasion personnel appearance in enclosing, in the case where there is invasion personnel appearance, ring is judged according to the identity of the invasion personnel Whether border is abnormal.
Alternatively, the common detection pattern includes:Judgment step, supervised for being detected according to the image information of the acquisition Whether there is invasion personnel appearance in the range of control, be judged as environmental abnormality in the case where there is invasion personnel appearance;Step is prompted, is used When abnormal prompt information is being provided in the case of being judged as environmental abnormality and/or is persistently recording a video default very first time threshold value Between.
Alternatively, the common detection pattern also includes:The very first time threshold value after environmental abnormality is judged as Within time, if occurring being judged as no longer providing abnormal prompt information in the case of environmental abnormality again and not interrupting video recording.
Alternatively, stranger's detection pattern also includes the identity for judging the invasion personnel;The invasion personnel's Identity includes accredited members' identity and non-registered member identities;The identity for judging the invasion personnel includes:People will be invaded Member's information is matched with the accredited members' information to prestore by recognition of face, in the case where the match is successful by the invasion people The identity of member is judged as accredited members' identity, is judged as the identity of the invasion personnel in the case of matching is unsuccessful The non-registered member identities.
Alternatively, in addition to by electronic equipment facial image is obtained, face is carried out by the facial image of the acquisition The successful personnel of the face registration are confirmed as accredited members' identity by registration.
Alternatively, stranger's detection pattern also includes:Image processing step, for being believed according to the image of the acquisition Whether there is invasion personnel appearance in breath detection monitoring range, in the case where there is invasion personnel appearance, start to record a video and judge institute State the identity of invasion personnel;Non- abnormal conditions processing step, it is all in the default second time threshold time for judging The identity of the invasion personnel, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping performing The security-protecting and monitoring method;Abnormal conditions processing step, for judge it is all within the default second time threshold time The invasion personnel identity be the non-registered member identities in the case of, provide abnormal prompt information;By described After second time threshold time, the non-abnormal conditions processing step and the abnormal conditions processing step are re-executed.
Alternatively, in addition to:Often pass through after the default 3rd time threshold time, stop this and record a video and restart Video recording;3rd time threshold is more than second time threshold.
Alternatively, in addition to:If monitored within the default 3rd time threshold time the non-registered member leave and Do not return, then no longer provide abnormal prompt information;3rd time threshold is more than second time threshold.
Alternatively, the abnormal prompt information that provides includes:Abnormal prompt information is shown by display device, passes through audio Equipment sends abnormal prompt sound, and/or provides abnormal prompt information by warning lamp;And/or by abnormal prompt information, scene Sound and/or scene image information are sent to electronic equipment, and the electronic equipment includes terminal and/or server, the terminal Including mobile terminal, notebook computer or desktop computer.
Alternatively, in addition to:Start to perform by electronic equipment control or stop performing the security-protecting and monitoring method, pass through Electronic equipment controls whether to provide abnormal prompt information, and/or starts to record a video by electronic equipment control or stop recording a video;It is described Electronic equipment includes terminal and/or server, and the terminal includes mobile terminal, notebook computer or desktop computer.
Another aspect of the present invention provides a kind of security monitoring device again, including:Image acquisition unit, supervised for obtaining Image information in the range of control;Intrusion detecting unit, for setting selection intrusion detection pattern according to user's setting or system, sentence Whether environment is abnormal in disconnected monitoring range;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern; The common detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, have into Invade in the case that personnel occur and be judged as environmental abnormality;Stranger's detection pattern detects according to the image information of the acquisition Whether invasion personnel appearance is had in monitoring range, in the case where there is invasion personnel appearance, according to the identity of the invasion personnel Judge whether environment is abnormal.
Alternatively, the common detection pattern includes:Judgment sub-unit, for being detected according to the image information of the acquisition Whether there is invasion personnel appearance in monitoring range, be judged as environmental abnormality in the case where there is invasion personnel appearance;Prompting is single Member, for providing abnormal prompt information in the case where being judged as environmental abnormality and/or default very first time threshold of persistently recording a video It is worth the time.
Alternatively, the common detection pattern also includes:The very first time threshold value after environmental abnormality is judged as Within time, if occurring being judged as no longer providing abnormal prompt information in the case of environmental abnormality again and not interrupting video recording.
Alternatively, stranger's detection pattern includes identity judgment sub-unit;The identity of the invasion personnel includes note Volume member identities and non-registered member identities;The identity judgment sub-unit is used for:The registration that personal information will be invaded and prestored Information about firms is matched by recognition of face, is judged as the identity of the invasion personnel in the case where the match is successful described Accredited members' identity, the identity of the invasion personnel is judged as non-registered member's body in the case of matching is unsuccessful Part.
Alternatively, in addition to registering unit, it is used for:Facial image is obtained by electronic equipment, passes through the people of the acquisition Face image carries out face registration, and the successful personnel of the face registration are confirmed as into accredited members' identity.
Alternatively, stranger's detection pattern also includes:Image procossing subelement, for the image according to the acquisition Whether there is invasion personnel appearance in infomation detection monitoring range, in the case where there is invasion personnel appearance, start to record a video and judge The identity of the invasion personnel;Non- abnormal conditions handle subelement, for judging the institute in the default second time threshold time The identity for the invasion personnel having, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping Perform the function performed by the security monitoring device;Abnormal conditions handle subelement, for judge it is all default In the case that the identity of the invasion personnel in second time threshold time is the non-registered member identities, exception is provided Prompt message;After the second time threshold time, the non-abnormal conditions processing subelement and described is re-executed Function performed by abnormal conditions processing subelement.
Alternatively, described image processing subelement is additionally operable to:Often pass through after the default 3rd time threshold time, stop This is recorded a video and restarts to record a video;3rd time threshold is more than second time threshold.
Alternatively, the non-abnormal conditions processing subelement is additionally operable to:If supervised within the default 3rd time threshold time Measure the non-registered member to leave and do not return, then no longer provide abnormal prompt information;3rd time threshold is more than institute State the second time threshold.
Alternatively, the abnormal prompt information that provides includes:Abnormal prompt information is shown by display device, passes through audio Equipment sends abnormal prompt sound, and/or provides abnormal prompt information by warning lamp;And/or by abnormal prompt information, scene Sound and/or scene image information are sent to electronic equipment, and the electronic equipment includes terminal and/or server, the terminal Including mobile terminal, notebook computer or desktop computer.
Alternatively, in addition to:Start to perform by electronic equipment control or stop the execution security monitoring device and held Capable function, by electronic equipment control whether to provide abnormal prompt information, and/or by electronic equipment control start video recording or Stop video recording;The electronic equipment includes terminal and/or server, and the terminal includes mobile terminal, notebook computer or platform Formula computer.
Another aspect of the present invention provides a kind of air-conditioning again, has the device described in any of the above-described.
Technical scheme can remotely in checking monitoring scope scene image, rational invasion can be selected by user Detection pattern, invasion personnel are more intelligently identified, the reliability of monitoring is improved, makes Environmental security more secure.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the present invention, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the general frame figure of security-protecting and monitoring method provided by the invention;
Fig. 2 is a kind of step flow of preferred embodiment of the common detection pattern of security-protecting and monitoring method provided by the invention Figure;
The step of Fig. 3 is a kind of preferred embodiment of stranger's detection pattern of security-protecting and monitoring method provided by the invention is flowed Cheng Tu;
Fig. 4 is the communication connection flow chart of security-protecting and monitoring method provided by the invention;
Fig. 5 is the overall structure figure of security monitoring device provided by the invention;
Fig. 6 is a kind of structural representation of preferred embodiment of security monitoring device provided by the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and Technical solution of the present invention is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the present invention one Section Example, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out under the premise of creative work the every other embodiment obtained, belong to the scope of protection of the invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use Data can exchange in the appropriate case, so as to embodiments of the invention described herein can with except illustrating herein or Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
One aspect of the present invention provides a kind of security-protecting and monitoring method.Fig. 1 is the whole of security-protecting and monitoring method provided by the invention Body frame diagram.As shown in figure 1, security-protecting and monitoring method of the present invention includes:Step S110, image acquisition step, monitored for obtaining In the range of image information;Step S120, intrusion detection step, for setting selection intrusion detection according to user's setting or system Pattern, judge whether environment is abnormal in monitoring range;The intrusion detection pattern includes common detection pattern and/or stranger examines Survey pattern;Whether the common detection pattern is detected in monitoring range according to the image information of the acquisition has invasion personnel to go out It is existing, it is judged as environmental abnormality in the case where there is invasion personnel appearance;Stranger's detection pattern is according to the figure of the acquisition As whether there is invasion personnel appearance in infomation detection monitoring range, in the case where there is invasion personnel appearance, according to the invasion The identity of personnel judges whether environment is abnormal.
Above-mentioned common detection pattern (being based on human testing, be identified using head and shoulder model) and stranger's detection pattern Respectively there are advantage and disadvantage (based on Face datection and human testing).As long as someone occurs to be judged as that environment is different in common detection pattern Often, it is that rate of failing to report is low, shortcoming is rate of false alarm height the advantages of this pattern;Can be according to the body of invasion personnel in stranger's detection pattern It is part whether abnormal to differentiate environment, it is that rate of false alarm is low the advantages of this pattern, it is likely that rate of failing to report can be slightly higher by contrast. User can select the intrusion detection pattern for being adapted to present case as needed, such as:Stranger's inspection may be selected in general Survey pattern, only stranger are just judged as environmental abnormality when invading, when kinsfolk (non-stranger) occurs under normal circumstances not Belong to abnormal conditions, so so as not to being bothered too much because of often the message of abnormal conditions is received;Needed in particular time Common detection pattern may be selected when especially strick precaution, as long as someone occurs that environmental abnormality will be judged as, make user timely Grasp situation, once corresponding measure can be taken in time by going wrong, better ensure that safety.System default setting can be set to general Logical detection pattern, user can perform intrusion detection the switching of pattern by APP.
Fig. 2 is a kind of step flow of preferred embodiment of the common detection pattern of security-protecting and monitoring method provided by the invention Figure.As shown in Fig. 2 according to a kind of embodiment of security-protecting and monitoring method of the present invention, the common detection pattern includes:Step S210, judgment step, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, having Invasion personnel are judged as environmental abnormality in the case of occurring;Step S220, step is prompted, for being judged as the feelings of environmental abnormality Abnormal prompt information is provided under condition and/or default very first time threshold time of persistently recording a video.Detected in common detection pattern Exception will be judged as to someone, this pattern can reduce rate of failing to report, it is ensured that safety.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, the common detection pattern also includes:It is being judged as Within the very first time threshold time after environmental abnormality, if in the case of occurring being judged as environmental abnormality again no longer to Go out abnormal prompt information and do not interrupt video recording.In this embodiment, detect that personnel leave in very first time threshold time And situation about occurring again not PUSH message because there is video recording continuing, need not continuous repeatedly PUSH message, this implementation Mode is more intelligent, more hommization.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, the abnormal prompt information that provides includes:By aobvious Show that equipment shows abnormal prompt information, abnormal prompt sound is sent by audio frequency apparatus, and/or provides abnormal carry by warning lamp Show information;And/or abnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronics is set Standby to include terminal and/or server, the terminal includes mobile terminal, notebook computer or desktop computer.Fast side Formula is the mobile phone PUSH message to user.
Specifically, common intrusion detection pattern is opened, camera detects whether someone in real time.Someone is detected first, then Initiation message pushes and starts the threshold value T1 times very first time of recording a video immediately;In the T1 times, personnel leave and occurred again, do not push away Send message (because having recorded a video for checking).After the T1 times, someone is detected, carries out message push immediately again, and is started new Video recording;If nobody, push and record a video without message.Enter if any new personnel, repeat above-mentioned action.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, stranger's detection pattern is also included described in judgement The identity of invasion personnel;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;The judgement institute Stating the identity of invasion personnel includes:Invasion personal information is matched with the accredited members' information to prestore by recognition of face, The identity of the invasion personnel is judged as accredited members' identity in the case where the match is successful, is matching unsuccessful feelings The identity of the invasion personnel is judged as the non-registered member identities under condition.
Specifically, security monitoring device can be arranged in certain electric equipment, while user mobile phone APP end has family Member management interface, the electric equipment that face registration and accredited members can be carried out by electric equipment or user mobile phone APP are liked Occupation mode is set, such as air-conditioning, including accredited members like air-supply and set.
Facial image is obtained according to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to by electronic equipment, Face registration is carried out by the facial image of the acquisition, the successful personnel of the face registration are confirmed as into accredited members' body Part.Face registration has two kinds of implementations, and one kind is to be taken pictures registration by cell phone application, and one kind is (such as sky based on electric equipment Adjust) local camera registered.Cell phone application logon mode is:Into after register interface, there is corresponding face template, wrap Positive face, side face are included, cell phone application carries out self-timer face by calling mobile phone front camera and obtains its head portrait, and user refers to one by one Face template is taken pictures and adds corresponding human face photo, and human face photo quantity is typically in 3-12, including positive face, side face.Enter After pedestrian's face is taken pictures and determined, user can carry out individual subscriber setting in APP, including the pet name of user, sex, the age and Like air supply pattern (temperature, wind speed, blowing wind speed) etc..Mode is locally registered in air-conditioning:User passes through air-conditioning panel, remote control Or cell phone application starts face registration.Rear user, which is locally registered, can obtain the head portrait of registered member at cell phone application end and it is entered Row individual subscriber is set, including the pet name of user, sex, age and hobby air supply pattern (temperature, wind speed, blowing wind speed) Deng.
The step of Fig. 3 is a kind of preferred embodiment of stranger's detection pattern of security-protecting and monitoring method provided by the invention is flowed Cheng Tu.As shown in figure 3, according to a kind of embodiment of security-protecting and monitoring method of the present invention, stranger's detection pattern also includes: Step S310, image processing step, for detecting in monitoring range whether have invasion personnel according to the image information of the acquisition Occur, in the case where there is invasion personnel appearance, start to record a video and judge the identity of the invasion personnel;Step S320, it is non-different Reason condition processing step, for judging the identity of all invasion personnel in the default second time threshold time, if Stop video recording in the case of wherein there are accredited members' identity and/or stop performing the security-protecting and monitoring method;Step S330, abnormal conditions processing step, for judging all invasion people within the default second time threshold time In the case that the identity of member is the non-registered member identities, abnormal prompt information is provided;By second time threshold After time, the non-abnormal conditions processing step and the abnormal conditions processing step are re-executed.
Specifically, strange contrived intrusion detection pattern is opened, camera detects whether someone in real time.Once someone is detected, Then start video recording and recognition of face immediately.In second time threshold T2 times, if matching invasion personnel as kinsfolk's (note Volume member identities), then stop video recording immediately and message does not push.It is kinsfolk as do not matched it in the T2 times, then enters Message pushes row first.Such as period, matching invader, then interruption video recording immediately and message push away for kinsfolk, closing security protection Send.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to:Often pass through default 3rd time threshold After time, stop this and record a video and restart to record a video;3rd time threshold is more than second time threshold.Specifically Ground, whether if not matched as kinsfolk by the 3rd time threshold T3, it is family to continue to be matched in next T3 times Member and start to record a video, such as the match is successful, then sends message and push and stop video recording and start new one end recording a video (continuously recording Oversize inconvenience was downloaded and checked time).As do not matched kinsfolk always, the operation of the above is repeated.The T3 times need to be more than T2, T2 The time is pushed to trigger message first, message is pushed to user APP ends by guarantee immediately in the short period of time.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to:In the default 3rd time threshold time If interior monitor that the non-registered member leaves and do not returned, abnormal prompt information is no longer provided;3rd time threshold More than second time threshold.Specifically, as in the 3rd time threshold T3 times, non-registered member leaves and does not have, Then stop message push.Within the T3 times, non-registered member leaves and returned, then still provides for message push and video recording.
According to a kind of embodiment of security-protecting and monitoring method of the present invention, in addition to:Start to perform by electronic equipment control Or stop performing the security-protecting and monitoring method, control whether to provide abnormal prompt information by electronic equipment, and/or pass through electronics Equipment control starts to record a video or stops recording a video;The electronic equipment includes terminal and/or server, and the terminal includes mobile whole End, notebook computer or desktop computer.The push of intrusion alarm message function can close on APP;Invading recording function can be Closed on APP.The push of intrusion alarm message is only closed, does not influence to detect video recording during someone.
Fig. 4 is the communication connection flow chart of security-protecting and monitoring method provided by the invention.Still so that electric equipment is air-conditioning as an example, User can enter real-time monitoring and control in APP terminals, and connection overhead is serviced by P2P (Peer to Peer, peer-to-peer network) Image module is adjusted, realizes real-time video monitoring.Video supports ultra high-definition 1080P, high definition 720P, SD 480P and smooth 280P's One or more, form is H.264.The communication connection flow of its unexpected message push is as shown in figure 4, cell phone application is established with air-conditioning The process of connection is as follows:
1. cell phone application initiates logging request by the user_id of oneself to server.
2. after logging in successfully, cell phone application obtains the session token specifically logged in.
3. cell phone application is by the token of oneself, and the dev_id for the air-conditioning to be connected, P2P connection requests are initiated.
Wherein:Keeps are the servers of cell phone application account storage;Connection server is P2P servers, Ke Yitong One server;It is that unique mac addresses (can be air-conditioning equipment or wifi module equipment to arrange device address dev_id Mac addresses).
Another aspect of the present invention provides a kind of security monitoring device again.Fig. 5 is safety monitoring dress provided by the invention The overall structure figure put.As shown in figure 5, security monitoring device of the present invention includes:Image acquisition unit 100, monitored for obtaining In the range of image information;Intrusion detecting unit 200, for setting selection intrusion detection pattern according to user's setting or system, Judge whether environment is abnormal in monitoring range;The intrusion detection pattern includes common detection pattern and/or stranger detects mould Formula;The common detection pattern detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, It is judged as environmental abnormality in the case of having invasion personnel appearance;Stranger's detection pattern is according to the image information of the acquisition Whether invasion personnel appearance is had in detection monitoring range, in the case where there is invasion personnel appearance, according to the invasion personnel's Identity judges whether environment is abnormal.
Fig. 6 is a kind of structural representation of preferred embodiment of security monitoring device provided by the invention.As shown in fig. 6, According to a kind of embodiment of security monitoring device of the present invention, the common detection pattern includes:Judgment sub-unit 210, is used for Whether have invasion personnel appearance, in the situation for having invasion personnel to occur if being detected according to the image information of the acquisition in monitoring range Under be judged as environmental abnormality;Subelement 220 is prompted, for providing abnormal prompt information in the case where being judged as environmental abnormality And/or default very first time threshold time of persistently recording a video.
According to a kind of embodiment of security monitoring device of the present invention, the common detection pattern also includes:It is being judged as Within the very first time threshold time after environmental abnormality, if in the case of occurring being judged as environmental abnormality again no longer to Go out abnormal prompt information and do not interrupt video recording.
According to a kind of embodiment of security monitoring device of the present invention, stranger's detection pattern includes identity and judges son Unit 230;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;The identity judgment sub-unit 230 are used for:Invasion personal information is matched with the accredited members' information to prestore by recognition of face, in the feelings that the match is successful The identity of the invasion personnel is judged as accredited members' identity under condition, by the invasion in the case of matching is unsuccessful The identity of personnel is judged as the non-registered member identities.
According to a kind of embodiment of security monitoring device of the present invention, in addition to registering unit 300, it is used for:Pass through electronics Equipment obtains facial image, face registration is carried out by the facial image of the acquisition, by the successful personnel of the face registration Confirm as accredited members' identity.
According to a kind of embodiment of security monitoring device of the present invention, stranger's detection pattern also includes:At image Manage subelement 240, for according to the image information of the acquisition detect monitoring range in whether have invasion personnel appearance, have into Invade in the case that personnel occur, start to record a video and judge the identity of the invasion personnel;Non- abnormal conditions handle subelement 250, For judging the identity of all invasion personnel in the default second time threshold time, if wherein there are the note Stop video recording in the case of volume member identities and/or stop performing the function performed by the security monitoring device;Abnormal conditions Subelement 260 is handled, for judging the identity of all invasion personnel within the default second time threshold time In the case of being the non-registered member identities, abnormal prompt information is provided;After the second time threshold time, Re-execute the non-abnormal conditions processing subelement and the function performed by abnormal conditions processing subelement.
According to a kind of embodiment of security monitoring device of the present invention, described image processing subelement 240 is additionally operable to:Often pass through Cross after the default 3rd time threshold time, stop this and record a video and restart to record a video;3rd time threshold is more than Second time threshold.
According to a kind of embodiment of security monitoring device of the present invention, the non-abnormal conditions processing subelement 250 is also used In:If being monitored within the default 3rd time threshold time, the non-registered member leaves and not returned, no longer provides different Normal prompt message;3rd time threshold is more than second time threshold.
According to a kind of embodiment of security monitoring device of the present invention, the abnormal prompt information that provides includes:By aobvious Show that equipment shows abnormal prompt information, abnormal prompt sound is sent by audio frequency apparatus, and/or provides abnormal carry by warning lamp Show information;And/or abnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronics is set Standby to include terminal and/or server, the terminal includes mobile terminal, notebook computer or desktop computer.
According to a kind of embodiment of security monitoring device of the present invention, in addition to:Start to perform by electronic equipment control Or stop performing function performed by the security monitoring device, control whether to provide abnormal prompt information by electronic equipment, And/or start to record a video by electronic equipment control or stop recording a video;The electronic equipment includes terminal and/or server, described Terminal includes mobile terminal, notebook computer or desktop computer.
Another aspect of the present invention provides a kind of air-conditioning again, has the device described in any of the above-described.
Technical scheme can remotely in checking monitoring scope scene image, rational invasion can be selected by user Detection pattern, invasion personnel are more intelligently identified, the reliability of monitoring is improved, makes Environmental security more secure.
Function described herein can be implemented in hardware, by the software of computing device, firmware or its any combinations. If implement in the software by computing device, then computer can be stored in using function as one or more instructions or code Transmitted on readable media or via computer-readable media.Other examples and embodiment will in of the invention and appended right Ask in the scope and spirit of book.For example, be attributed to the property of software, function described above can be used by processor, Hardware, firmware, hardwired appoint the software implementation that the combination of whichever performs in these.In addition, each functional unit can integrate In a processing unit or unit is individually physically present, can also two or more units be integrated in In one unit.
In several embodiments provided herein, it should be understood that disclosed technology contents, others can be passed through Mode is realized.Wherein, device embodiment described above is only schematical, such as the division of the unit, Ke Yiwei A kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module Connect, can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, as control fill The part put can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server or network equipment etc.) perform each embodiment methods described of the present invention whole or Part steps.And foregoing storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with store program codes Medium.
Embodiments of the invention are the foregoing is only, are not intended to limit the invention, for those skilled in the art For member, the present invention can have various modifications and variations.Any modification within the spirit and principles of the invention, being made, Equivalent substitution, improvement etc., should be included within scope of the presently claimed invention.

Claims (21)

  1. A kind of 1. security-protecting and monitoring method, it is characterised in that including:
    Image acquisition step, for obtaining the image information in monitoring range;
    Intrusion detection step, for setting selection intrusion detection pattern according to user's setting or system, judge monitoring range inner ring Whether border is abnormal;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;The common detection mould Formula detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, in the feelings for having invasion personnel to occur It is judged as environmental abnormality under condition;Stranger's detection pattern according to the image information of the acquisition detect monitoring range in whether There is invasion personnel appearance, in the case where there is invasion personnel appearance, judge whether environment is different according to the identity of the invasion personnel Often.
  2. 2. according to the method for claim 1, it is characterised in that the common detection pattern includes:
    Judgment step, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, having Invasion personnel are judged as environmental abnormality in the case of occurring;
    Step is prompted, for providing abnormal prompt information in the case where being judged as environmental abnormality and/or persistently recording a video default Very first time threshold time.
  3. 3. according to the method for claim 2, it is characterised in that the common detection pattern also includes:
    Within the very first time threshold time being judged as after environmental abnormality, if occurring being judged as environmental abnormality again In the case of no longer provide abnormal prompt information and do not interrupt video recording.
  4. 4. according to the method any one of claim 1-3, it is characterised in that stranger's detection pattern also includes sentencing The identity of the disconnected invasion personnel;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;It is described Judging the identity of the invasion personnel includes:Invasion personal information is carried out with the accredited members' information to prestore by recognition of face Matching, the identity of the invasion personnel is judged as accredited members' identity in the case where the match is successful, matching not into The identity of the invasion personnel is judged as the non-registered member identities in the case of work(.
  5. 5. according to the method for claim 4, it is characterised in that also include obtaining facial image by electronic equipment, pass through The facial image of the acquisition carries out face registration, and the successful personnel of the face registration are confirmed as into accredited members' identity.
  6. 6. the method according to claim 4 or 5, it is characterised in that stranger's detection pattern also includes:
    Image processing step, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, In the case where there is invasion personnel appearance, start to record a video and judge the identity of the invasion personnel;
    Non- abnormal conditions processing step, for judging all invasion personnel's in the default second time threshold time Identity, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping performing the safety monitoring side Method;
    Abnormal conditions processing step, for judging all invasion personnel within the default second time threshold time Identity be the non-registered member identities in the case of, provide abnormal prompt information;
    After the second time threshold time, the non-abnormal conditions processing step and the abnormal conditions are re-executed Processing step.
  7. 7. according to the method for claim 6, it is characterised in that also include:Often pass through the default 3rd time threshold time Afterwards, stop this recording a video and restart to record a video;3rd time threshold is more than second time threshold.
  8. 8. the method according to claim 6 or 7, it is characterised in that also include:Within the default 3rd time threshold time If monitoring, the non-registered member leaves and not returned, no longer provides abnormal prompt information;3rd time threshold is big In second time threshold.
  9. 9. according to the method any one of claim 2-8, it is characterised in that the abnormal prompt information that provides includes:
    Abnormal prompt information is shown by display device, abnormal prompt sound is sent by audio frequency apparatus, and/or passes through warning lamp Provide abnormal prompt information;And/or
    Abnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronic equipment is included eventually End and/or server, the terminal include mobile terminal, notebook computer or desktop computer.
  10. 10. according to the method any one of claim 1-9, it is characterised in that also include:Opened by electronic equipment control Begin to perform or stop performing the security-protecting and monitoring method, control whether to provide abnormal prompt information, and/or lead to by electronic equipment Electronic equipment control is crossed to start to record a video or stop recording a video;The electronic equipment includes terminal and/or server, and the terminal includes Mobile terminal, notebook computer or desktop computer.
  11. A kind of 11. security monitoring device, it is characterised in that including:
    Image acquisition unit, for obtaining the image information in monitoring range;
    Intrusion detecting unit, for setting selection intrusion detection pattern according to user's setting or system, judge monitoring range inner ring Whether border is abnormal;The intrusion detection pattern includes common detection pattern and/or stranger's detection pattern;The common detection mould Formula detects in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, in the feelings for having invasion personnel to occur It is judged as environmental abnormality under condition;Stranger's detection pattern according to the image information of the acquisition detect monitoring range in whether There is invasion personnel appearance, in the case where there is invasion personnel appearance, judge whether environment is different according to the identity of the invasion personnel Often.
  12. 12. device according to claim 11, it is characterised in that the common detection pattern includes:
    Judgment sub-unit, for detecting in monitoring range whether have invasion personnel appearance according to the image information of the acquisition, It is judged as environmental abnormality in the case of having invasion personnel appearance;
    Subelement is prompted, it is default for providing abnormal prompt information and/or lasting video recording in the case where being judged as environmental abnormality Very first time threshold time.
  13. 13. device according to claim 12, it is characterised in that the common detection pattern also includes:
    Within the very first time threshold time being judged as after environmental abnormality, if occurring being judged as environmental abnormality again In the case of no longer provide abnormal prompt information and do not interrupt video recording.
  14. 14. according to the device any one of claim 11-13, it is characterised in that stranger's detection pattern includes Identity judgment sub-unit;The identity of the invasion personnel includes accredited members' identity and non-registered member identities;The identity is sentenced Disconnected subelement is used for:Will invasion personal information matched with the accredited members' information to prestore by recognition of face, match into The identity of the invasion personnel is judged as accredited members' identity in the case of work(, by institute in the case of matching is unsuccessful The identity for stating invasion personnel is judged as the non-registered member identities.
  15. 15. device according to claim 14, it is characterised in that also including registering unit, be used for:Obtained by electronic equipment Facial image is taken, face registration is carried out by the facial image of the acquisition, the successful personnel of the face registration are confirmed as Accredited members' identity.
  16. 16. the device according to claims 14 or 15, it is characterised in that stranger's detection pattern also includes:
    Image procossing subelement, whether there are invasion personnel to go out for being detected according to the image information of the acquisition in monitoring range It is existing, in the case where there is invasion personnel appearance, start to record a video and judge the identity of the invasion personnel;
    Non- abnormal conditions handle subelement, for judging all invasion personnel in the default second time threshold time Identity, if stopping video recording in the case of wherein there are accredited members' identity and/or stopping performing the safety monitoring Function performed by device;
    Abnormal conditions handle subelement, for judging all invasion people within the default second time threshold time In the case that the identity of member is the non-registered member identities, abnormal prompt information is provided;
    After the second time threshold time, the non-abnormal conditions processing subelement and the abnormal feelings are re-executed Function performed by condition processing subelement.
  17. 17. device according to claim 16, it is characterised in that described image processing subelement is additionally operable to:Often by pre- If the 3rd time threshold time after, stop this and record a video and restart to record a video;3rd time threshold is more than described Second time threshold.
  18. 18. the device according to claim 16 or 17, it is characterised in that the non-abnormal conditions processing subelement is also used In:If being monitored within the default 3rd time threshold time, the non-registered member leaves and not returned, no longer provides different Normal prompt message;3rd time threshold is more than second time threshold.
  19. 19. according to the device any one of claim 12-18, it is characterised in that described to provide abnormal prompt packet Include:
    Abnormal prompt information is shown by display device, abnormal prompt sound is sent by audio frequency apparatus, and/or passes through warning lamp Provide abnormal prompt information;And/or
    Abnormal prompt information, live sound and/or scene image information are sent to electronic equipment, the electronic equipment is included eventually End and/or server, the terminal include mobile terminal, notebook computer or desktop computer.
  20. 20. according to the device any one of claim 11-19, it is characterised in that also include:Controlled by electronic equipment Start to perform or stop performing function performed by the security monitoring device, control whether to provide abnormal carry by electronic equipment Show information, and/or start to record a video by electronic equipment control or stop recording a video;The electronic equipment includes terminal and/or service Device, the terminal include mobile terminal, notebook computer or desktop computer.
  21. 21. a kind of air-conditioning, it is characterised in that there is the device as any one of claim 11-20.
CN201710849693.5A 2017-09-20 2017-09-20 Security-protecting and monitoring method, device and the air-conditioning with the device Pending CN107860097A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710849693.5A CN107860097A (en) 2017-09-20 2017-09-20 Security-protecting and monitoring method, device and the air-conditioning with the device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710849693.5A CN107860097A (en) 2017-09-20 2017-09-20 Security-protecting and monitoring method, device and the air-conditioning with the device

Publications (1)

Publication Number Publication Date
CN107860097A true CN107860097A (en) 2018-03-30

Family

ID=61699477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710849693.5A Pending CN107860097A (en) 2017-09-20 2017-09-20 Security-protecting and monitoring method, device and the air-conditioning with the device

Country Status (1)

Country Link
CN (1) CN107860097A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326082A (en) * 2018-09-30 2019-02-12 珠海格力电器股份有限公司 Security-protecting and monitoring method, device, system, server and air-conditioning
CN110686353A (en) * 2019-09-26 2020-01-14 珠海格力电器股份有限公司 Image control method and device, storage medium and air conditioner
CN110796015A (en) * 2019-09-27 2020-02-14 深圳市大拿科技有限公司 Remote monitoring method and device
CN111815887A (en) * 2020-07-16 2020-10-23 深圳鞠慈云科技有限公司 Security warning system
CN113037842A (en) * 2021-03-09 2021-06-25 国网山东省电力公司庆云县供电公司 Remote maintenance system of substation automation system
CN113112721A (en) * 2021-04-21 2021-07-13 阳光三星(合肥)储能电源有限公司 Energy storage system anti-theft method and application device
CN114360230A (en) * 2021-09-24 2022-04-15 深圳市卡联科技股份有限公司 Bus safety early warning method, system, device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013109440A (en) * 2011-11-18 2013-06-06 Tsukamoto Musen:Kk Security camera apparatus
CN103731598A (en) * 2012-10-12 2014-04-16 中兴通讯股份有限公司 Intelligent monitoring terminal and video monitoring method
JP2014229097A (en) * 2013-05-23 2014-12-08 三菱電機株式会社 Air conditioner equipped with monitoring function
CN104243896A (en) * 2013-06-17 2014-12-24 鸿富锦精密工业(深圳)有限公司 Smart television monitoring anti-theft method and system
CN104902242A (en) * 2015-06-04 2015-09-09 广东美的制冷设备有限公司 Anti-theft monitoring air conditioner and monitoring method for air conditioner
CN105611248A (en) * 2015-12-25 2016-05-25 北京奇虎科技有限公司 Monitoring method, device and system based on camera
CN106152425A (en) * 2016-08-31 2016-11-23 芜湖美智空调设备有限公司 Security-protecting and monitoring method based on air-conditioning and air-conditioner
CN106373312A (en) * 2016-08-27 2017-02-01 桂林信通科技有限公司 Safety protection method and system based on air-conditioner

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013109440A (en) * 2011-11-18 2013-06-06 Tsukamoto Musen:Kk Security camera apparatus
CN103731598A (en) * 2012-10-12 2014-04-16 中兴通讯股份有限公司 Intelligent monitoring terminal and video monitoring method
JP2014229097A (en) * 2013-05-23 2014-12-08 三菱電機株式会社 Air conditioner equipped with monitoring function
CN104243896A (en) * 2013-06-17 2014-12-24 鸿富锦精密工业(深圳)有限公司 Smart television monitoring anti-theft method and system
CN104902242A (en) * 2015-06-04 2015-09-09 广东美的制冷设备有限公司 Anti-theft monitoring air conditioner and monitoring method for air conditioner
CN105611248A (en) * 2015-12-25 2016-05-25 北京奇虎科技有限公司 Monitoring method, device and system based on camera
CN106373312A (en) * 2016-08-27 2017-02-01 桂林信通科技有限公司 Safety protection method and system based on air-conditioner
CN106152425A (en) * 2016-08-31 2016-11-23 芜湖美智空调设备有限公司 Security-protecting and monitoring method based on air-conditioning and air-conditioner

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326082A (en) * 2018-09-30 2019-02-12 珠海格力电器股份有限公司 Security-protecting and monitoring method, device, system, server and air-conditioning
CN109326082B (en) * 2018-09-30 2021-05-07 珠海格力电器股份有限公司 Security monitoring method, device, system, server and air conditioner
CN110686353A (en) * 2019-09-26 2020-01-14 珠海格力电器股份有限公司 Image control method and device, storage medium and air conditioner
CN110796015A (en) * 2019-09-27 2020-02-14 深圳市大拿科技有限公司 Remote monitoring method and device
CN111815887A (en) * 2020-07-16 2020-10-23 深圳鞠慈云科技有限公司 Security warning system
CN113037842A (en) * 2021-03-09 2021-06-25 国网山东省电力公司庆云县供电公司 Remote maintenance system of substation automation system
CN113037842B (en) * 2021-03-09 2022-11-01 国网山东省电力公司庆云县供电公司 Remote maintenance system of substation automation system
CN113112721A (en) * 2021-04-21 2021-07-13 阳光三星(合肥)储能电源有限公司 Energy storage system anti-theft method and application device
CN114360230A (en) * 2021-09-24 2022-04-15 深圳市卡联科技股份有限公司 Bus safety early warning method, system, device and storage medium
CN114360230B (en) * 2021-09-24 2024-02-02 深圳市卡联科技股份有限公司 Bus safety early warning method, system, device and storage medium

Similar Documents

Publication Publication Date Title
CN107860097A (en) Security-protecting and monitoring method, device and the air-conditioning with the device
US11785146B2 (en) Doorbell call center
CN108198292B (en) Household monitoring method and system based on intelligent cloud lock
US10522013B2 (en) Street watch
US10769645B2 (en) Method and device for calculating customer traffic volume
CN107341880A (en) A kind of home security method and system
US8520072B1 (en) Video monitoring and alarm verification technology
WO2017118182A1 (en) Terminal and operation method therefor
CN107592498A (en) A kind of cell management method and relevant device based on intelligent video camera head
CN205080681U (en) Register one's residence door electronic monitoring device
CN111757069B (en) Monitoring anti-theft method and device based on intelligent doorbell
CN113284274A (en) Trailing identification method and computer readable storage medium
US20190068924A1 (en) Monitoring system having personal information protection function and method thereof
CN110766849A (en) Method, device, equipment and medium for automatically identifying foreign personnel by community access control
CN107131607A (en) Monitoring method, device, system and air-conditioning based on air-conditioning
CN105872466A (en) Alarm method and alarm device based on smart TV
CN114898443A (en) Face data acquisition method and device
CN107292208B (en) Anti-theft method and device for mobile terminal
CN107729798A (en) Banister control method, system and computer-readable recording medium
CN105100125B (en) A kind of dormancy control method of virtual desktop, apparatus and system
CN106448013A (en) Smart theft prevention apparatus
WO2018106437A2 (en) Street watch
WO2022227528A1 (en) Air conditioner control method and system, and air conditioner
CN108564750A (en) Security alarm method, apparatus and household appliance
CN112804492A (en) Communication prompting method and device for electronic cat eye

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330

RJ01 Rejection of invention patent application after publication