CN108198555A - Security guard and its configuration method - Google Patents

Security guard and its configuration method Download PDF

Info

Publication number
CN108198555A
CN108198555A CN201810141371.XA CN201810141371A CN108198555A CN 108198555 A CN108198555 A CN 108198555A CN 201810141371 A CN201810141371 A CN 201810141371A CN 108198555 A CN108198555 A CN 108198555A
Authority
CN
China
Prior art keywords
host
security guard
voice
module
console
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810141371.XA
Other languages
Chinese (zh)
Inventor
张鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810141371.XA priority Critical patent/CN108198555A/en
Publication of CN108198555A publication Critical patent/CN108198555A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Alarm Systems (AREA)

Abstract

This application involves a kind of security guard and its configuration methods.In the security guard,Sound acquisition module can be in the space setting for having certain distance with security guard,By the voice around sound acquisition module acquisition security guard,And voice is returned into host,Host can identify whether the voice of sound acquisition module acquisition is voice of seeking help,If seek help voice,It is considered as anomalous event,It needs to take safety guard measure immediately,At this moment,Host can be triggered, the unlatching request of remote assistance function is sent to long-range console by wireless network card,After unlatching,Image capture module is opened in control,The image of security guard's ambient enviroment can be acquired,And it is sent to long-range console,The situation around security guard is understood so as to the personnel of console,And when security personnel do not reach scene,It can be by controlling host,Defensive module is opened to be defended immediately,The generation of the anomalous events such as prevention crime that can be much sooner,Protect personal safety as well as the property safety.

Description

Security guard and its configuration method
Technical field
This application involves technical field of security and protection more particularly to a kind of security guard and its configuration methods.
Background technology
In the relevant technologies, to ensure personal safety as well as the property safety, it is required for taking peace in places such as community, company, tourist attractions Full protection measure.For example, it can be monitored in real time, in each place setting monitoring camera although exception can be monitored Event, but can not timely processing.
Invention content
To solve the problems, such as the relevant technologies at least to a certain extent, the application provide a kind of security guard and its Configuration method.
According to the embodiment of the present application in a first aspect, provide a kind of security guard, including:
Moveable host;The host has the function of speech identifying function and remote assistance;
Wireless network card, image capture module, the defensive module being set on the host;
At least one sound collector connecting can be wirelessly communicated with the host;
The sound collector, for acquiring voice;
Described image acquisition module, for acquiring image;
The host, whether the voice that the sound collector acquisition is identified for passing through the speech identifying function is to ask Voice is helped, if seeking help voice, then this host is triggered and is opened by the wireless network card to console transmission remote assistance function Request is opened, after the remote assistance function is opened, described image acquisition module is opened in control, and described image acquisition module is acquired Image be sent to the console, defended so that the console controls the host to open the defensive module.
Preferably, the sound collector can be communicated to connect with the host by bluetooth.
Preferably, it is additionally provided with locating module on the host;The locating module, for being carried out to the security guard Positioning, obtains location information;The host is additionally operable to pass through the location information of safety bodyguard and mark described wireless Network interface card is sent to mobile phone terminal, so that voice of seeking help is sent to the safety nearest apart from the mobile phone terminal by the mobile phone terminal Bodyguard.
Preferably, it is additionally provided with alarm on the host;
The host, be additionally operable to when identify seek help voice when, to the alarm send alarm signal;
The alarm, for after the alarm signal is received, sending out alarm.
Preferably, it is provided with crawler belt on the host;The host is additionally operable under the control of the console, control The crawler belt movement;
Alternatively, at least one wheel pairs are provided on the host;The wheel protrudes from top and the institute of the host State the chassis of host;The host is additionally operable under the control of the console, driving wheel movement.
Preferably, further include the accumulator and socket being set on the host;Wherein:
The accumulator, for providing working power for the security guard;
The socket, for connecting external power supply, to charge for the accumulator.
Preferably, the defensive module includes:
Cover the moveable safety net of a part for the host;
Rotatable hydraulic giant;The rotatable hydraulic giant, for spraying capsicum water;
Electric saw;
The host is additionally operable under the control of the console, and the safety net is controlled to be moved from the front end of this host To rear end, the hydraulic giant rotation water spray and the control electric saw is controlled to open, to carry out safety guard.
According to the second aspect of the embodiment of the present application, a kind of configuration side of the security guard as described in any of the above item is provided Method, including:
The remote assistance function of host is configured and identifies the speech identifying function for voice of seeking help;
The unlatching icon of remote assistance function is shown on the display connected in the host, and the host is connected The pointer of the input equipment connect is shown in the position for opening icon;
The host is configured to:Identified by the speech identifying function seek help voice when, by the language of seeking help Sound chooses instruction as the pointer of the input equipment, to choose the unlatching icon, opens the remote assistance function.
Preferably, the remote assistance function is the remote assistance function in QQ application programs.
Preferably, the input equipment is mouse.
According to the third aspect of the embodiment of the present application, a kind of non-transitorycomputer readable storage medium is provided, when described When instruction in storage medium is performed by the processor of security guard so that security guard is able to carry out a kind of such as any of the above item The configuration method of the security guard, the method includes:
The remote assistance function of host is configured and identifies the speech identifying function for voice of seeking help;
The unlatching icon of remote assistance function is shown on the display connected in the host, and the host is connected The pointer of the input equipment connect is shown in the position for opening icon;
The host is configured to:Identified by the speech identifying function seek help voice when, by the language of seeking help Sound chooses instruction as the pointer of the input equipment, to choose the unlatching icon, opens the remote assistance function.
According to the fourth aspect of the embodiment of the present application, the configuration dress of security guard as described in any of the above item a kind of is provided It puts, including:Processor;For storing the memory of processor-executable instruction;Wherein, the processor is configured as:
The remote assistance function of host is configured and identifies the speech identifying function for voice of seeking help;
The unlatching icon of remote assistance function is shown on the display connected in the host, and the host is connected The pointer of the input equipment connect is shown in the position for opening icon;
The host is configured to:Identified by the speech identifying function seek help voice when, by the language of seeking help Sound chooses instruction as the pointer of the input equipment, to choose the unlatching icon, opens the remote assistance function.
The technical solution that embodiments herein provides can include the following benefits:Due on the host of security guard Wireless network card, image capture module, defensive module are provided with, at least one sound that being additionally provided with can wirelessly communicate with host is adopted Collect module, in this way, sound acquisition module can be acquired in the space setting for having certain distance with security guard by sound acquisition module Voice around security guard, and by voice back to host, host can identify that the voice of sound acquisition module acquisition is No is voice of seeking help, if seeking help voice, is considered as anomalous event, needs to take safety guard measure immediately, this When, host can be triggered, the unlatching request of remote assistance function, after unlatching, control are sent to long-range console by wireless network card System opens image capture module, the image of security guard's ambient enviroment can be acquired, and be sent to long-range console, to control The personnel of platform processed understand the situation around security guard, and when security personnel do not reach scene, it is possible to by controlling host, It opens defensive module to be defended immediately, in this way, the generation of the anomalous events such as prevention crime that can be much sooner, the protection person Property safety.
It should be understood that above general description and following detailed description are only exemplary and explanatory, not The application can be limited.
Description of the drawings
Attached drawing herein is incorporated into specification and forms the part of this specification, shows the implementation for meeting the application Example, and for explaining the principle of the application together with specification.
Fig. 1 is according to a kind of one of structure diagram of security guard shown in an exemplary embodiment.
Fig. 2 is the second structural representation according to a kind of security guard shown in an exemplary embodiment.
Fig. 3 is the third structural representation according to a kind of security guard shown in an exemplary embodiment.
Fig. 4 is four of the structure diagram according to a kind of security guard shown in an exemplary embodiment.
Fig. 5 is five of the structure diagram according to a kind of security guard shown in an exemplary embodiment.
Fig. 6 is the configuration method flow chart according to a kind of security guard shown in an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The consistent security guard of some aspects be described in detail in claims, the application and its example of configuration method.
According to the embodiment of the present application in a first aspect, as shown in Figure 1, provide a kind of security guard, including:
Moveable host 101;Host has the function of speech identifying function and remote assistance;
Wireless network card 102, image capture module 103, the defensive module 104 being set on host;
At least one sound collector 105 connecting can be wirelessly communicated with host 101;
Sound collector 105, for acquiring voice;
Image capture module 103, for acquiring image;
Host 101, for identifying whether the voice that sound collector acquires is voice of seeking help by speech identifying function, such as Fruit is voice of seeking help, then triggers this host and send the unlatching request of remote assistance function to console by wireless network card, long-range to assist After assist can open, image capture module is opened in control, and the image that image capture module acquires is sent to console 106, with Just console control host is opened defensive module and is defended.
In the present embodiment, due to being provided with wireless network card, image capture module, defensive module on the host of security guard, At least one sound acquisition module that can be wirelessly communicated with host is additionally provided with, in this way, sound acquisition module can be defended with safety The space that scholar has certain distance is set, and by the voice around sound acquisition module acquisition security guard, and voice is returned to master Machine, host can identify whether the voice of sound acquisition module acquisition is voice of seeking help, if seeking help voice, has been considered as Anomalous event occurs, and needs to take safety guard measure immediately, at this moment, can trigger host by wireless network card to long-range control Platform processed sends remote assistance function and opens request, and after unlatching, image capture module is opened in control, can acquire security guard's week The image in collarette border, and long-range console is sent to, so as to the situation around the personnel understanding security guard of console, and When security personnel do not reach scene, it is possible to by controlling host, open defensive module and be defended immediately, in this way, can be more Add the generation for timely preventing the anomalous events such as crime, protect personal safety as well as the property safety.
Wherein, above-mentioned host can be, but not limited to as host computer.
Wherein, image capture module 103 can be rotatable camera.In this way, the image of multi-angle can be acquired, it will Situation around security guard is more comprehensively supplied to console.Image capture module 103 can also include thermal imaging member With rotatable camera.Wherein, in the image of thermal imaging member acquisition, the object behind barrier can be seen through barrier Body for example, can see the people behind wall through wall, can further appreciate that the situation around security guard.
Wherein, there are many modes of the communication connection of host and sound acquisition module.For example, sound collector can with host Can be communicated to connect by bluetooth.
For the situation on the periphery for recognizing security guard that can be comprehensive, preferably, the quantity of sound collector is Two or more, each sound collector are not exactly the same with respect to the setting direction of host.In this way, each sound collector is arranged on host Different directions, the voices of security guard's all directions can be acquired, protection is more in place.In addition, each sound collector It can also be different with the distance of host.Further carry out disposition.
To realize the movement of host, preferably, in the security guard that some embodiments provide, as shown in Fig. 2, being set on host It is equipped with crawler belt 107;Host 101 is additionally operable under the control of console, control crawler belt movement;
Alternatively, at least one wheel pairs are provided on host;Wheel protrudes from the top of host and the chassis of host;It is main Machine is additionally operable under the control of console, driving wheel movement.
In this way, on the chassis of host when close to ground side, wheel and crawler belt can move, if in the abnormal thing of processing During part, security guard is thrown, and when close to ground side, host can equally move, and protective capacities is stronger at the top of host. In order to further adapt to this case, image capture module 103 can also set it is multiple, as shown in figure 3, two figures can be set As acquisition module 103, it is separately positioned on the top and chassis of host.Preferably, image collecting device 103 can also be scalable Structure, can be retractable to inside host, be hardly damaged.
Since security guard is moveable, the inapplicable power supply being fixedly connected.Based on this, as shown in figure 4, compared with Goodly, the security guard that some embodiments provide further includes the accumulator 108 and socket being set on host;Wherein:Accumulator, For providing working power for security guard;Socket, for connecting external power supply, to charge for accumulator.In the present embodiment, peace The rechargeable storage battery of full bodyguard's setting can provide lasting electric energy supply.
Preferably, as shown in figure 4, it is additionally provided with alarm 109 on the host that some embodiments provide;Host is additionally operable to When identify seek help voice when, to alarm send alarm signal;Alarm, for after alarm signal is received, sending out report It is alert.In this way, recognize seek help voice when, seek help, can also be sent out by alarm in addition to that can be sent out to long-range console Go out alarm, to remind the generation of people's anomalous event of surrounding, handled in time.
Preferably, in the security guard that some embodiments provide, as shown in figure 5, defensive module 104 includes:
Cover the moveable safety net (not shown) of a part for host;
Rotatable hydraulic giant 1041;Rotatable hydraulic giant, for spraying capsicum water;
Electric saw (not shown);
Host 101 is additionally operable under the control of console, and control safety net is moved to rear end from the front end of this host, controls Hydraulic giant rotation water spray and control electric saw processed are opened, to carry out safety guard.
Under normal circumstances, safety net is arranged on the front end of host.
If it find that anomalous event, such as steal, violent crime, safety net can be moved to the rear end of host, then By the way that rotatable hydraulic giant is controlled to spray capsicum water or by electric saw to surrounding, prestige penetrates the generation for preventing crime.
Wherein, rotatable hydraulic giant includes at least water tank, nozzle, nozzle button, button driving structure, hose and can be clockwise inverse The motor (motor 1042 shown in Fig. 5) turned.Nozzle is connected to water tank by hose.Wherein, when nozzle button is opened, nozzle Water spray, during closing, nozzle stops water spray.Button driving structure, under the control of host, driving nozzle button.Wherein, horse It reaches, it is clockwise and reverse under the control of host.When motor is clockwise, reverse changes, nozzle can rotate upwardly and downwardly water spray.
Preferably, it is additionally provided with locating module on above-mentioned host;Locating module for being positioned to security guard, obtains To location information;Host is additionally operable to the location information of safety bodyguard and mark being sent to mobile phone terminal by wireless network card, So that voice of seeking help is sent to the security guard nearest apart from mobile phone terminal by mobile phone terminal.Wherein, it is equipped on mobile phone terminal Corresponding APP.Wherein, the mark of security guard is exactly preset machine code.In this way, mobile phone terminal can receive each peace The location information of full bodyguard, when being abnormal event, needing to seek help, it is possible to send language of seeking help to nearest security guard Sound.After security guard receives the voice of seeking help of mobile phone terminal, remote assistance can be opened, it is anti-that safety is carried out under remote assistance It defends.
According to the second aspect of the embodiment of the present application, a kind of matching for security guard as described in any of the above embodiment is provided Method is put, as shown in fig. 6, including at least following steps:
Step 610, the remote assistance function that host is configured and the speech identifying function for identifying voice of seeking help;
The unlatching icon of remote assistance function is shown in step 620, the display connected in host, and host is connected The pointer of the input equipment connect is shown in the position for opening icon;
Host is configured to by step 630:Identifying that the voice that will seek help is made when seeking help voice by speech identifying function Pointer for input equipment chooses instruction, to choose unlatching icon, opens remote assistance function.
In the present embodiment, speech identifying function and remote assistance function is configured for host, long-range association is shown by display Assist can unlatching icon, by the pointer of input equipment be arranged on open icon position, and need by host be configured in the hope of Voice is helped to choose instruction as the pointer of input equipment, icon startup remote assistance function is opened to choose, in this way, just completing Security guard is arranged on the spatial position of needs by the configuration of security guard, it is possible to carry out security protection, configuration mode letter It is single.
Wherein, before security guard is configured, it is also necessary to which the host of security guard is connect with display, input equipment. After configuring security guard, it is also necessary to disconnect the host of security guard and the connection of display, input equipment.
Preferably, above-mentioned remote assistance function is the remote assistance function in QQ application programs.Correspondingly, above-mentioned unlatching figure It is designated as the unlatching icon of the remote assistance function in QQ.It is real using the remote assistance function in QQ this application in the present embodiment Existing remote control, it is more convenient.
Preferably, above-mentioned input equipment can be, but not limited to as mouse.
Below by taking specific application scenarios as an example, the security guard and its configuration methods that provide some embodiments carry out more Add and describe in detail.
In the present embodiment, security guard includes:Host;Crawler belt, accumulator, image capture module, report are provided on host Alert device, rotatable hydraulic giant, unlimited network interface card, defensive module;Multiple sound acquisition modules that can be communicated to connect by bluetooth with host. Wherein, sound acquisition module is microphone.Wherein defensive module includes rotatable hydraulic giant, electric saw, safety net.Each component can refer to Figure 1 above~structure shown in fig. 5 is configured.
Security guard further includes shell and frame.Wherein, frame is used to carry the component on host and its host.Shell For encapsulating security guard.
It is as follows to the configuration process of security guard:
Step 1: opening the hotspot on mobile phone or opening wireless router, enable the host to pass through wireless network card It connects mobile phone hot spot or wireless router carries out wireless networking.Host is connect respectively with mouse, display.
Step 2: speech identifying function is configured for host so that host can identify voice of seeking help.Wherein, it seeks help voice Including " robbery " " freeze, dares to cry and cuts you to death " " money is taken out " " having killed you " " cutting you to death " " help " " murder " Alarm etc. Deng.And the voice that will seek help is configured to the instruction of " clicking left mouse button ".
Step 3: downloading and starting QQ, the chat window of specified good friend, point choice-start item " remote desktop ", by mouse are opened Pointer rest on " request other side remote assistance " option.
Step 4: the connection of host and mouse and display is disconnected.
In implementation, when being abnormal event, the voice of the environment of acquisition is sent to host by microphone, and host leads to It crosses after speech identifying function identifies voice of seeking help, host will be considered that left mouse button is clicked, and at this moment, " request other side remotely assists Help " it will be selected, remote control oneself is asked to the staff of console by wireless network card, remote assistance function is opened It opens, at this moment, the staff of console can open camera and thermal imaging member, in this way, can rely on long-range control host machine The image of camera acquisition understands ambient enviroment and sees people nearby, judgement position and root through barrier by thermal imaging According to the action of the shadow, special circumstances are manually determined whether there is, if be violent crime event.
After if staff is determined as that violent crime event, staff can control safety net to be moved to host Face, control crawler belt are moved to destination, and the electric saw on bodyguard safe to use adds in the capsicum water of special pigment with filling in accordance with the law Hydraulic giant is deterred and is attacked to offender, and is passed through alarm and called police.
According to the third aspect of the embodiment of the present application, a kind of non-transitorycomputer readable storage medium is provided, works as storage When instruction in medium is performed by the processor of security guard so that security guard is able to carry out a kind of such as any of the above embodiment The configuration method of the security guard, method include:
The remote assistance function of host is configured and identifies the speech identifying function for voice of seeking help;
The unlatching icon of remote assistance function, and the input that host is connected are shown on the display connected in host The pointer of equipment is shown in the position for opening icon;
Host is configured to:Identifying that the voice that will seek help is set as input when seeking help voice by speech identifying function Standby pointer chooses instruction, to choose unlatching icon, opens remote assistance function.
According to the fourth aspect of the embodiment of the present application, a kind of matching for security guard as described in any of the above embodiment is provided Device is put, including:Processor;For storing the memory of processor-executable instruction;Wherein, processor is configured as:
The remote assistance function of host is configured and identifies the speech identifying function for voice of seeking help;
The unlatching icon of remote assistance function, and the input that host is connected are shown on the display connected in host The pointer of equipment is shown in the position for opening icon;
Host is configured to:Identifying that the voice that will seek help is set as input when seeking help voice by speech identifying function Standby pointer chooses instruction, to choose unlatching icon, opens remote assistance function.
About the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
It is understood that same or similar part can mutually refer in the various embodiments described above, in some embodiments Unspecified content may refer to the same or similar content in other embodiment.
It should be noted that in the description of the present application, term " first ", " second " etc. are only used for description purpose, without It is understood that indicate or implying relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple " Refer at least two.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function, this should be by the application Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a processing module, it can also That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments " The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments herein has been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to the limitation to the application is interpreted as, those of ordinary skill in the art within the scope of application can be to above-mentioned Embodiment is changed, changes, replacing and modification.

Claims (10)

1. a kind of security guard, which is characterized in that including:
Moveable host;The host has the function of speech identifying function and remote assistance;
Wireless network card, image capture module, the defensive module being set on the host;
At least one sound collector connecting can be wirelessly communicated with the host;
The sound collector, for acquiring voice;
Described image acquisition module, for acquiring image;
The host, whether the voice that the sound collector acquisition is identified for passing through the speech identifying function is language of seeking help Sound, if seeking help voice, then triggering this host please to console transmission remote assistance function unlatching by the wireless network card It asks, after the remote assistance function is opened, described image acquisition module, the figure that described image acquisition module is acquired are opened in control As being sent to the console, defended so that the console controls the host to open the defensive module.
2. security guard according to claim 1, which is characterized in that the sound collector passes through bluetooth with the host It can communicate to connect.
3. security guard according to claim 1, which is characterized in that be additionally provided with locating module on the host;It is described Locating module for being positioned to the security guard, obtains location information;The host is additionally operable to safety bodyguard The location information and mark mobile phone terminal is sent to by the wireless network card, so that the mobile phone terminal will seek help voice It is sent to the security guard nearest apart from the mobile phone terminal.
4. security guard according to claim 1, which is characterized in that be additionally provided with alarm on the host;
The host, be additionally operable to when identify seek help voice when, to the alarm send alarm signal;
The alarm, for after the alarm signal is received, sending out alarm.
5. security guard according to claim 1, which is characterized in that be provided with crawler belt on the host;The host, also For the crawler belt under the control of the console, to be controlled to move;
Alternatively, at least one wheel pairs are provided on the host;The wheel protrudes from the top of the host and the master The chassis of machine;The host is additionally operable under the control of the console, driving wheel movement.
6. security guard according to claim 1, which is characterized in that further include the accumulator that is set on the host and Socket;Wherein:
The accumulator, for providing working power for the security guard;
The socket, for connecting external power supply, to charge for the accumulator.
7. security guard according to claim 1, which is characterized in that the defensive module includes:
Cover the moveable safety net of a part for the host;
Rotatable hydraulic giant;The rotatable hydraulic giant, for spraying capsicum water;
Electric saw;
The host is additionally operable under the control of the console, after the safety net is controlled to be moved to from the front end of this host End controls the hydraulic giant rotation water spray and the control electric saw to open, to carry out safety guard.
It is 8. a kind of such as the configuration method of claim 1~7 any one of them security guard, which is characterized in that including:
The remote assistance function of host is configured and identifies the speech identifying function for voice of seeking help;
The unlatching icon of remote assistance function is shown on the display connected in the host, and the host is connected The pointer of input equipment is shown in the position for opening icon;
The host is configured to:Identified by the speech identifying function seek help voice when, by it is described seek help voice make Pointer for the input equipment chooses instruction, to choose the unlatching icon, opens the remote assistance function.
9. according to the method described in claim 8, it is characterized in that, the remote assistance function is long-range in QQ application programs Assist in functions.
10. according to the method described in claim 8, it is characterized in that, the input equipment is mouse.
CN201810141371.XA 2018-02-11 2018-02-11 Security guard and its configuration method Pending CN108198555A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810141371.XA CN108198555A (en) 2018-02-11 2018-02-11 Security guard and its configuration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810141371.XA CN108198555A (en) 2018-02-11 2018-02-11 Security guard and its configuration method

Publications (1)

Publication Number Publication Date
CN108198555A true CN108198555A (en) 2018-06-22

Family

ID=62593656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810141371.XA Pending CN108198555A (en) 2018-02-11 2018-02-11 Security guard and its configuration method

Country Status (1)

Country Link
CN (1) CN108198555A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047358A (en) * 2019-12-10 2020-04-21 秒针信息技术有限公司 Member information query method and system based on face recognition

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202159418U (en) * 2011-07-15 2012-03-07 刘光浩 Household safety system
CN202985566U (en) * 2012-07-26 2013-06-12 王云 Security robot based on human face identification
CN103605334A (en) * 2013-10-29 2014-02-26 昆山宏凌电子有限公司 Remote control system for rural supermarket
CN107168079A (en) * 2017-06-05 2017-09-15 百色学院 A kind of home security robot system based on radio communication
CN107195153A (en) * 2017-07-06 2017-09-22 陈旭东 A kind of intelligent household security system
CN107186731A (en) * 2017-06-29 2017-09-22 上海未来伙伴机器人有限公司 One kind defence robot
CN107378967A (en) * 2017-08-25 2017-11-24 安徽鑫美芝光电科技有限公司 A kind of intelligent robot

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202159418U (en) * 2011-07-15 2012-03-07 刘光浩 Household safety system
CN202985566U (en) * 2012-07-26 2013-06-12 王云 Security robot based on human face identification
CN103605334A (en) * 2013-10-29 2014-02-26 昆山宏凌电子有限公司 Remote control system for rural supermarket
CN107168079A (en) * 2017-06-05 2017-09-15 百色学院 A kind of home security robot system based on radio communication
CN107186731A (en) * 2017-06-29 2017-09-22 上海未来伙伴机器人有限公司 One kind defence robot
CN107195153A (en) * 2017-07-06 2017-09-22 陈旭东 A kind of intelligent household security system
CN107378967A (en) * 2017-08-25 2017-11-24 安徽鑫美芝光电科技有限公司 A kind of intelligent robot

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047358A (en) * 2019-12-10 2020-04-21 秒针信息技术有限公司 Member information query method and system based on face recognition

Similar Documents

Publication Publication Date Title
CN103273982B (en) A kind of Multifunctional all-terrain bio-robot
EP3118826B1 (en) Home, office security, surveillance system using micro mobile drones and ip cameras
EP2998945B1 (en) System for auto-configuration of devices in a building information model using bluetooth low energy
CN109684989A (en) Safety custody method, apparatus, terminal and computer readable storage medium
US20090191839A1 (en) Personal alarm and serveillance system
JP6075609B2 (en) Information processing system, information processing apparatus, information processing method, information processing program, portable communication terminal, control method thereof, and control program thereof
US11846477B2 (en) Smart firearm safety device
CN103886698B (en) Portable anti-theft device and related anti-theft system and anti-theft method
Meghana et al. Design and implementation of surveillance robot for outdoor security
CN103037089A (en) Help system of mobile device
EP3098794A1 (en) Security and surveillance system based on intelligent mobile devices
CN208196805U (en) A kind of hiding system of robot
CN106205022A (en) A kind of security system for home security and method
CN106288212A (en) Household safety protection method and device and air conditioner
CN110349360A (en) A kind of building window area deployment system and monitoring method
CN107657687A (en) A kind of access control management method and entrance guard management server based on image processing techniques
CA2833152A1 (en) System and method of visual communication using touch screen
CN108198555A (en) Security guard and its configuration method
CN207558176U (en) A kind of AED seeks help case and AED help system
CN105913597A (en) Domestic household intelligent anti-intrusion security protection system
CN110021139A (en) Wearable device, server and wearable monitor system
CN104952228A (en) Antitheft protection opening method, and apparatus and system thereof
CN110075461A (en) A kind of fire fighting and rescue method and apparatus based on unmanned plane and monitoring robot
CN105054940B (en) Secure localization patient monitor and its monitoring method
CN109448189A (en) Self-service bank's management method, self-service bank and self-service bank's system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180622