CN108428316A - Security monitoring method and device, security equipment and household appliance - Google Patents
Security monitoring method and device, security equipment and household appliance Download PDFInfo
- Publication number
- CN108428316A CN108428316A CN201810234003.XA CN201810234003A CN108428316A CN 108428316 A CN108428316 A CN 108428316A CN 201810234003 A CN201810234003 A CN 201810234003A CN 108428316 A CN108428316 A CN 108428316A
- Authority
- CN
- China
- Prior art keywords
- monitoring
- target person
- security
- user
- grade
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 112
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012545 processing Methods 0.000 claims abstract description 21
- 230000009471 action Effects 0.000 claims description 50
- 238000012806 monitoring device Methods 0.000 claims description 28
- 238000012549 training Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 12
- 230000014509 gene expression Effects 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 7
- 230000008901 benefit Effects 0.000 abstract description 3
- 230000006866 deterioration Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 10
- 230000006378 damage Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000009977 dual effect Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 208000027418 Wounds and injury Diseases 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 208000014674 injury Diseases 0.000 description 2
- 238000013178 mathematical model Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001568 sexual effect Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19658—Telephone systems used to communicate with a camera, e.g. PSTN, GSM, POTS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/174—Facial expression recognition
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Alarm Systems (AREA)
Abstract
The application provides a security monitoring method and device, security equipment or household appliances, wherein the method or device is applied to the monitoring equipment or the household appliances, and particularly collects three-dimensional data of target personnel entering a monitoring area; processing the three-dimensional data by using a preset identification model to obtain the truth information of the target personnel; and forwarding the truth information to the mobile equipment of the user so that the user can determine the monitoring measures aiming at the target personnel according to the truth information of the user. The method and the device have the advantages that the truth information of the target person is sent to the user in real time, so that the user can obtain the corresponding truth information when the target user enters, the real-time performance of monitoring measures is guaranteed, intervention can be made under the condition that dangerous persons are identified in real time, the person can arrive at the scene or give an alarm, and accordingly danger is avoided or further deterioration is avoided.
Description
Technical field
This application involves technical field of security and protection, more specifically to a kind of security-protecting and monitoring method, device, security device
And household electrical appliance.
Background technology
Safety defense monitoring system be using optical fiber, coaxial cable or microwave its closure loop in transmission video signal, and
The system for constituting independent completion is shown and recorded from camera shooting to image.It can real-time, vivid, truly reflect monitored object,
The viewing distance of human eye is not only greatly extended, and expands the function of human eye, it can be replaced under rugged environment
It is artificial to carry out long-time monitoring, it is recorded by video recorder, people can leaf through at any time the actually occurring of monitored scene
Situation,.
However, current safety monitoring system is only capable of accomplishing Passive Defence, i.e., pass through playback after there is dangerous or accident
The image recorded searches reason or personnel, can not accomplish that Realtime Alerts, people also just can not be in time to occurent danger
Intervened, to make the essential of its security protection have a greatly reduced quality.
Invention content
In view of this, the application provides a kind of security-protecting and monitoring method, device, security device and household electrical appliance, for into
Enter the positive personnel at risk of monitoring area to be identified in time, allow the user to make intervention in time, to avoid dangerous generation
Or further deteriorate.
To achieve the goals above, it is proposed that scheme it is as follows:
A kind of security-protecting and monitoring method, is applied to security device or household electrical appliance, and the security-protecting and monitoring method specifically includes step
Suddenly:
Three-dimensional data of the acquisition into the target person of monitoring area;
The three-dimensional data is handled using preset identification model, obtains the reality information of the target person;
The reality information is forwarded to the mobile device of user, allows the user to the reality information according to the user
Determine the surveillance and control measure for the target person.
Optionally, the three-dimensional data include the target person appearance, height and expression in some or all of.
Optionally, the training method of the identification model includes the following steps:
Acquire the information and personal information in kind of the monitoring area;
The information in kind and the personal information are trained preset learning function as training sample, obtain
The identification model.
Optionally, further include step:
It receives user and instruction is set according to the security protection grade that the reality information is sent;
Instruction is set according to the security protection grade, and monitoring grade is determined to the target person;
The target person is monitored according to determining monitoring grade.
Optionally, the monitoring grade includes that absolute protection class, general protection and action restricted classes and action are stringent
Restricted classes.
Optionally, described that the target person is monitored according to determining monitoring grade, including:
When the monitoring grade of the target person is the strictly limited grade of the action, the target person is closely monitored
Action message;
The action message is identified using preset action recognition model, to judge whether the target person has
Dangerous property;
When judging that the target person has dangerous, to the timely alert of user, and in time to user's
Mobile device, which is sent, has dangerous video or photo.
A kind of security monitoring device, is applied to security device or household electrical appliance, and the security monitoring device specifically includes:
Data acquisition equipment, for acquiring the three-dimensional data into the target person of monitoring area;
Data processing module obtains the mesh for being handled the three-dimensional data using preset identification model
The reality information of mark personnel;
Information sending module, the mobile device for the reality information to be forwarded to user, allows the user to basis
The reality information of the user determines the surveillance and control measure for the target person.
Optionally, the three-dimensional data include the target person appearance, height and expression in some or all of.
Optionally, further include model training module, wherein:
The model training module is used to acquire the information and personal information in kind of the monitoring area;By the letter in kind
Breath and the personal information are trained preset learning function as training sample, obtain the identification model.
Optionally, further include:
Information receiving module sets instruction for receiving user according to the security protection grade that the reality information is sent;
Class setting module determines monitoring grade for setting instruction according to the security protection grade to the target person;
Execution module is monitored, for being monitored to the target person according to determining monitoring grade.
Optionally, the monitoring grade includes that absolute protection class, general protection and action restricted classes and action are stringent
Restricted classes.
Optionally, the monitoring execution module includes:
Action message collecting unit, for being the strictly limited grade of action when the monitoring grade of the target person
When, closely monitor the action message of the target person;
Dangerous play recognition unit, for the action message to be identified using preset action recognition model, with
Judge whether the target person has danger;
Warning message transmission unit, for when judging that the target person has dangerous, sending out report in time to user
Alert information, and sent to the mobile device of user have dangerous video or photo in time.
A kind of security device is optionally provided with security monitoring device as described above.
A kind of household electrical appliance are optionally provided with security monitoring device as described above.
A kind of household electrical appliance, are provided with stereo photographic device and processing unit, wherein:
The stereo photographic device is used to acquire the three-dimensional data into the target person of monitoring area;
The processing unit obtains the target for being handled the three-dimensional data using preset identification model
The reality information of personnel;And the reality information is forwarded to the mobile device of user, it allows the user to according to the user
Reality information determine for the target person surveillance and control measure.
Optionally, the processing unit is additionally operable to receive the security protection grade that user sends according to the reality information and set to refer to
It enables;Instruction is set according to the security protection grade, and monitoring grade is determined to the target person;According to determining monitoring grade to institute
Target person is stated to be monitored.
Optionally, the processing unit is the controller of the household electrical appliance.
It can be seen from the above technical scheme that this application discloses a kind of security-protecting and monitoring method, device, security device or
Household electrical appliance, this method or device are applied to monitoring device or household electrical appliance, specially target person of the acquisition into monitoring area
The three-dimensional data of member;Three-dimensional data is handled using preset identification model, obtains the reality information of target person;It incite somebody to action this
True information is forwarded to the mobile device of user, allows the user to determine the prison for target person according to the reality information of user
Control measure.Since the scheme of the application is that the reality information by target person is sent to user in real time, user can be in mesh
Mark user can obtain corresponding reality information while entrance, ensure that the real-time of surveillance and control measure, danger is identified in real time
Intervention can be made in the case of dangerous personnel, is such as on the scene or alarms, and deteriorated so as to avoid dangerous generation or further.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of step flow chart of security-protecting and monitoring method provided by the embodiments of the present application;
Fig. 2 is the step flow chart of another security-protecting and monitoring method provided by the embodiments of the present application;
Fig. 3 is a kind of structure diagram of security monitoring device provided by the embodiments of the present application;
Fig. 4 is the structure diagram of another security monitoring device provided by the embodiments of the present application;
Fig. 5 is the structure diagram of another security monitoring device provided by the embodiments of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment shall fall in the protection scope of this application.
Embodiment one
Fig. 1 is a kind of step flow chart of security-protecting and monitoring method provided by the embodiments of the present application.
As shown in Figure 1, security-protecting and monitoring method provided in this embodiment is applied to security device or household electrical appliance, due to family
It is normally at the highest point in room with air conditioner, naturally there is position advantage, therefore household electrical appliance here include but do not limit to
With domestic air conditioner.The security-protecting and monitoring method specifically comprises the following steps:
S1:Three-dimensional data of the acquisition into the target person of monitoring area.
Here monitoring area can be the inner space of a room, a workshop, the inside of vehicle, aircraft
Or the region etc. delimited on open place, do not limit specifically, as long as meet a clearing and suitable for acquisition video or
The space of photo all can serve as the monitoring area.
When there is personnel i.e. target person to enter the monitoring area, constituting stereo photographic device acquisition using dual camera should
The three-dimensional data of target person, the three-dimensional data can be its appearance, height or expression.
S2:Three-dimensional data is handled, the reality information of target person is obtained.
Here reality information refer to the target person three-dimensional data in removal camouflage, makeup etc. coverings true number
According to.Concrete measure is to be handled three-dimensional data using preset identification model, to obtain the reality letter of the target person
Breath.
Here identification model is the mathematical model that monitoring device or household electrical appliance are preset at its controller before manufacture;
Either it is trained to obtain using preset learning function in later stage operational process in monitoring device or household electrical appliance.When
When taking later approach, the training method of the identification module includes the following steps:
First, acquire the information and personal information in kind in monitoring area, information in kind include the wall in room, furniture,
Electric appliance etc., personal information include then into information such as appearance, height and the expressions of personnel of the monitoring area;
Then, above-mentioned information in kind and personal information are trained preset learning function as sample data, from
And obtain the identification model.
In addition, manufacturer can also as the case may be with the development of current techniques, periodically or non-periodically to preset mould
Type is upgraded by network.
S3:Reality information is sent to user.
I.e. when the real user of security device or household electrical appliance is not in the monitoring area, when the sheet for obtaining the target person
When true information, which is sent in the mobile device of user.The reality that user can be received according to mobile device
Information judges the property of the target person, i.e., the target person is household, friend or strange personnel, and is determined according to the property
Corresponding surveillance and control measure.
It can be seen from the above technical proposal that present embodiments providing a kind of security-protecting and monitoring method, this method is applied to prison
Control equipment or household electrical appliance, specially three-dimensional data of the acquisition into the target person of monitoring area;Utilize preset identification mould
Type handles three-dimensional data, obtains the reality information of target person;Reality information is forwarded to the mobile device of user, with
It allows users to determine the surveillance and control measure for target person according to the reality information of user.Since the scheme of the application is real-time
The reality information of target person is sent to user, therefore user can obtain accordingly while target user enters
Reality information ensure that the real-time of surveillance and control measure, can make intervention in the case where identifying personnel at risk in real time, such as catch up with
To scene or alarm, deteriorate so as to avoid dangerous generation or further.
In addition, the application further includes following steps, as shown in Figure 2:
S4:Receive the security protection grade setting instruction that user sends.
That is user can be set after the reality information for receiving target person by mobile device by the mobile device
Corresponding monitoring grade.It is such as directed to household, which can be absolute protection class, i.e., not by the grade of any infringement;
For friend, monitoring grade can be general protection and action restricted classes, i.e., not by the action made by serious infringement and its
Receive a kind of grade of certain limitation;For strange personnel, monitoring grade can be set as acting strictly limited grade, i.e., not
It can arbitrarily get around, any attack sexual act etc. cannot be made.
In addition, for the old man and child of family, it can also be set as acting strictly limited grade, here limited is one
Kind of protection, such as the actions such as cannot fall down, collide with, because these actions mean to receive injury.
Monitoring grade is set in user, and the mobile device sends security protection grade according to the monitoring grade set and sets
When instruction, the instruction is received.
S5:Instruction is set according to security protection grade, and monitoring grade is determined to target person.
The monitoring grade of target person, the monitoring grade and what described above phase are determined according to the instruction in local
Together, which is not described herein again.
S6:Target person is monitored according to monitoring grade.
After setting monitoring grade, target person is monitored according to monitoring grade, i.e., according to monitored target
Certain Disposal Measures are made in the action of personnel.
The premise of monitoring is that the action of target person is identified, and specific identification measure is:
First, when the monitoring grade of target person is confirmed as acting strictly limited grade, the target person is closely monitored
The action of member, obtains the action message of the target person;
Then, action message is identified using preset action recognition model, to judge the action of the target person
Whether can cause damages, i.e., to household, either whether friend causes damages or for being caused to itself for old man or child
Harm;
Finally, when judging that target person has dangerous, to the timely alert of user so that user come back,
It alarms and either makes other intervening measures to avoid dangerous generation or further deteriorate.Meanwhile in alert
While to the mobile device of user send specific video or photo, allow the user to have the detailed palm to concrete condition
It holds.
Can be that user brings safer assistance services compared to basic technical solution by above-mentioned measure.
Embodiment two
Fig. 3 is a kind of structure diagram of security monitoring device provided by the embodiments of the present application.
As shown in figure 3, security monitoring device provided in this embodiment is applied to security device or household electrical appliance, due to family
It is normally at the highest point in room with air conditioner, naturally there is position advantage, therefore household electrical appliance here include but do not limit to
With domestic air conditioner.The security monitoring device specifically includes data acquisition equipment 10, data processing module 20 and information and sends mould
Block 30.
Data acquisition equipment is used to acquire the three-dimensional data into the target person of monitoring area.
Here monitoring area can be the inner space of a room, a workshop, the inside of vehicle, aircraft
Or the region etc. delimited on open place, do not limit specifically, as long as meet a clearing and suitable for acquisition video or
The space of photo all can serve as the monitoring area.
When there is personnel i.e. target person to enter the monitoring area, constituting stereo photographic device acquisition using dual camera should
The three-dimensional data of target person, the three-dimensional data can be its appearance, height or expression.
Data processing module obtains the reality information of target person for handling three-dimensional data.
Here reality information refer to the target person three-dimensional data in removal camouflage, makeup etc. coverings true number
According to.Concrete measure is to be handled three-dimensional data using preset identification model, to obtain the reality letter of the target person
Breath.
Here identification model is the mathematical model that monitoring device or household electrical appliance are preset at its controller before manufacture;
Either it is trained to obtain using preset learning function in later stage operational process in monitoring device or household electrical appliance.When
When taking later approach, the security monitoring device of the present embodiment further includes corresponding model training module, as shown in figure 4, should
Model training module 40 is specifically used for:
First, acquire the information and personal information in kind in monitoring area, information in kind include the wall in room, furniture,
Electric appliance etc., personal information include then into information such as appearance, height and the expressions of personnel of the monitoring area;
Then, above-mentioned information in kind and personal information are trained preset learning function as sample data, from
And obtain the identification model.
In addition, manufacturer can also as the case may be with the development of current techniques, periodically or non-periodically to preset mould
Type is upgraded by network.
Information sending module is used to reality information being sent to user.
I.e. when the real user of security device or household electrical appliance is not in the monitoring area, when the sheet for obtaining the target person
When true information, which is sent in the mobile device of user.The reality that user can be received according to mobile device
Information judges the property of the target person, i.e., the target person is household, friend or strange personnel, and is determined according to the property
Corresponding surveillance and control measure.
It can be seen from the above technical proposal that present embodiments providing a kind of security monitoring device, which is applied to prison
Control equipment or household electrical appliance, specially three-dimensional data of the acquisition into the target person of monitoring area;Utilize preset identification mould
Type handles three-dimensional data, obtains the reality information of target person;Reality information is forwarded to the mobile device of user, with
It allows users to determine the surveillance and control measure for target person according to the reality information of user.Since the scheme of the application is real-time
The reality information of target person is sent to user, therefore user can obtain accordingly while target user enters
Reality information ensure that the real-time of surveillance and control measure, can make intervention in the case where identifying personnel at risk in real time, such as catch up with
To scene or alarm, deteriorate so as to avoid dangerous generation or further.
It is held in addition, the security monitoring device of the application further includes information receiving module 50, class setting module 60 and monitoring
Row module 70, as shown in Figure 5:
Information receiving module is used to receive the security protection grade setting instruction of user's transmission.
That is user can be set after the reality information for receiving target person by mobile device by the mobile device
Corresponding monitoring grade.It is such as directed to household, which can be absolute protection class, i.e., not by the grade of any infringement;
For friend, monitoring grade can be general protection and action restricted classes, i.e., not by the action made by serious infringement and its
Receive a kind of grade of certain limitation;For strange personnel, monitoring grade can be set as acting strictly limited grade, i.e., not
It can arbitrarily get around, any attack sexual act etc. cannot be made.
In addition, for the old man and child of family, it can also be set as acting strictly limited grade, here limited is one
Kind of protection, such as the actions such as cannot fall down, collide with, because these actions mean to receive injury.
Monitoring grade is set in user, and the mobile device sends security protection grade according to the monitoring grade set and sets
When instruction, the instruction is received.
Class setting module is used to set instruction according to security protection grade determines monitoring grade to target person.
The monitoring grade of target person, the monitoring grade and what described above phase are determined according to the instruction in local
Together, which is not described herein again.
Monitoring execution module is used to be monitored target person according to monitoring grade.
After setting monitoring grade, target person is monitored according to monitoring grade, i.e., according to monitored target
Certain Disposal Measures are made in the action of personnel.
The premise of monitoring is that the action of target person is identified, the module specifically include action message collecting unit,
Dangerous play recognition unit and warning message transmission unit.
Action message collecting unit is used for when the monitoring grade of target person is confirmed as acting strictly limited grade, tightly
The close action for monitoring the target person, obtains the action message of the target person;
Dangerous play recognition unit, should with judgement for action message to be identified using preset action recognition model
Whether the action of target person can cause damages, i.e., to household either friend cause damages or for old man or child for
Whether cause damages to itself;
Warning message transmission unit is used for when dangerous play recognition unit judgement target person has dangerous, to user
Timely alert so that user come back, alarm either make other intervening measures to avoid dangerous generation or
Further deteriorate.Meanwhile specific video or photo are sent to the mobile device of user while alert, with
Allow users to have detailed grasp to concrete condition.
Can be that user brings safer assistance services compared to basic technical solution by above-mentioned measure.
Embodiment three
A kind of security device is present embodiments provided, which is provided with the security protection prison that an embodiment as above is provided
Device is controlled, which is specifically used for acquisition into the three-dimensional data of the target person of monitoring area;Utilize preset identification model
Three-dimensional data is handled, the reality information of target person is obtained;Reality information is forwarded to the mobile device of user, so that
User can determine the surveillance and control measure for target person according to the reality information of user.Since the scheme of the application is in real time will
The reality information of target person is sent to user, therefore user can obtain corresponding sheet while target user enters
True information ensure that the real-time of surveillance and control measure, can make intervention in the case where identifying personnel at risk in real time, such as rush to
Scene or alarm deteriorate so as to avoid dangerous generation or further.
Example IV
A kind of household electrical appliance, such as domestic air conditioner are present embodiments provided, which is provided with embodiment two and is carried
The security monitoring device of confession, the device are specifically used for acquisition into the three-dimensional data of the target person of monitoring area;Using default
Identification model three-dimensional data is handled, obtain the reality information of target person;Reality information is forwarded to the shifting of user
Dynamic equipment allows the user to determine the surveillance and control measure for target person according to the reality information of user.Due to the application's
Scheme be in real time the reality information by target person to user send, therefore user can while target user enters energy
Corresponding reality information is obtained, ensure that the real-time of surveillance and control measure, can be done in the case where identifying personnel at risk in real time
At intervening, being such as on the scene or alarming, deteriorate so as to avoid dangerous generation or further.
Embodiment five
A kind of household electrical appliance, such as domestic air conditioner are present embodiments provided, which is provided with stereo camera shooting dress
It sets and processing unit.The stereo photographic device is provided with dual camera, for acquiring three into the target person of monitoring area
Dimension data;Processing unit is then used to handle three-dimensional data using preset identification model, obtains the reality of target person
Information;Reality information is forwarded to the mobile device of user, allows the user to be determined for mesh according to the reality information of user
The surveillance and control measure of mark personnel.Since the scheme of the application is that the reality information by target person is sent to user in real time, use
Family can obtain corresponding reality information while target user enters, and the real-time of surveillance and control measure be ensure that, in reality
When identify personnel at risk in the case of can make intervention, be such as on the scene or alarm, so as to avoid dangerous generation or
Further deteriorate.
Above-mentioned processing unit can be the built-in controller of the household electrical appliance.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating
Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present application is with reference to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided
Computer program instructions are set to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine so that is held by the processor of computer or other programmable data processing terminal equipments
Capable instruction generates for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes
The device of specified function.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing terminal equipments
In computer-readable memory operate in a specific manner so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows
And/or in one box of block diagram or multiple boxes specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also include other elements that are not explicitly listed, or further include for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device including the element.
Technical solution provided herein is described in detail above, specific case used herein is to this Shen
Principle and embodiment please is expounded, the explanation of above example is only intended to help understand the present processes and its
Core concept;Meanwhile for those of ordinary skill in the art, according to the thought of the application, in specific implementation mode and application
There will be changes in range, in conclusion the contents of this specification should not be construed as limiting the present application.
Claims (17)
1. a kind of security-protecting and monitoring method is applied to security device or household electrical appliance, which is characterized in that the security-protecting and monitoring method tool
Body includes step:
Three-dimensional data of the acquisition into the target person of monitoring area;
The three-dimensional data is handled using preset identification model, obtains the reality information of the target person;
The reality information is forwarded to the mobile device of user, allows the user to be determined according to the reality information of the user
For the surveillance and control measure of the target person.
2. security-protecting and monitoring method as described in claim 1, which is characterized in that the three-dimensional data includes the target person
Some or all of in appearance, height and expression.
3. security-protecting and monitoring method as described in claim 1, which is characterized in that the training method of the identification model includes as follows
Step:
Acquire the information and personal information in kind of the monitoring area;
The information in kind and the personal information are trained preset learning function as training sample, obtain described
Identification model.
4. such as claims 1 to 3 any one of them security-protecting and monitoring method, which is characterized in that further include step:
It receives user and instruction is set according to the security protection grade that the reality information is sent;
Instruction is set according to the security protection grade, and monitoring grade is determined to the target person;
The target person is monitored according to determining monitoring grade.
5. security-protecting and monitoring method as claimed in claim 4, which is characterized in that the monitoring grade include absolute protection class,
General protection and action restricted classes and the strictly limited grade of action.
6. security-protecting and monitoring method as claimed in claim 5, which is characterized in that it is described according to determining monitoring grade to the mesh
Mark personnel are monitored, including:
When the monitoring grade of the target person is the strictly limited grade of the action, the dynamic of the target person is closely monitored
Make information;
The action message is identified using preset action recognition model, to judge whether the target person has danger
It is dangerous;
When judging that the target person has dangerous, to the timely alert of user, and in time to the movement of user
Equipment, which is sent, has dangerous video or photo.
7. a kind of security monitoring device is applied to security device or household electrical appliance, which is characterized in that the security monitoring device tool
Body includes:
Data acquisition equipment, for acquiring the three-dimensional data into the target person of monitoring area;
Data processing module obtains the target person for being handled the three-dimensional data using preset identification model
The reality information of member;
Information sending module, the mobile device for the reality information to be forwarded to user are allowed the user to according to
The reality information of user determines the surveillance and control measure for the target person.
8. security monitoring device as claimed in claim 7, which is characterized in that the three-dimensional data includes the target person
Some or all of in appearance, height and expression.
9. security monitoring device as claimed in claim 7, which is characterized in that further include model training module, wherein:
The model training module is used to acquire the information and personal information in kind of the monitoring area;By the information in kind and
The personal information is trained preset learning function as training sample, obtains the identification model.
10. such as claim 7~9 any one of them security monitoring device, which is characterized in that further include:
Information receiving module sets instruction for receiving user according to the security protection grade that the reality information is sent;
Class setting module determines monitoring grade for setting instruction according to the security protection grade to the target person;
Execution module is monitored, for being monitored to the target person according to determining monitoring grade.
11. security monitoring device as claimed in claim 10, which is characterized in that the monitoring grade includes absolutely protection etc.
Grade, general protection and action restricted classes and the strictly limited grade of action.
12. security monitoring device as claimed in claim 11, which is characterized in that the monitoring execution module includes:
Action message collecting unit is used for when the monitoring grade of the target person is the strictly limited grade of the action, tightly
The action message of the close monitoring target person;
Dangerous play recognition unit, for the action message to be identified using preset action recognition model, to judge
Whether the target person has danger;
Warning message transmission unit, for when judging that the target person has dangerous, alarm signal to be sent out in time to user
Breath, and sent to the mobile device of user have dangerous video or photo in time.
13. a kind of security device, which is characterized in that be arranged just like claim 7~12 any one of them security monitoring device.
14. a kind of household electrical appliance, which is characterized in that be arranged just like claim 7~12 any one of them security monitoring device.
15. a kind of household electrical appliance, which is characterized in that it is provided with stereo photographic device and processing unit, wherein:
The stereo photographic device is used to acquire the three-dimensional data into the target person of monitoring area;
The processing unit obtains the target person for being handled the three-dimensional data using preset identification model
Reality information;And the reality information is forwarded to the mobile device of user, allow the user to the sheet according to the user
True information determines the surveillance and control measure for the target person.
16. household electrical appliance as claimed in claim 15, which is characterized in that the processing unit is additionally operable to receive user according to institute
State the security protection grade setting instruction of reality information transmission;Instruction is set according to the security protection grade, and prison is determined to the target person
Control grade;The target person is monitored according to determining monitoring grade.
17. household electrical appliance as claimed in claim 15, which is characterized in that the processing unit is the control of the household electrical appliance
Device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810234003.XA CN108428316A (en) | 2018-03-21 | 2018-03-21 | Security monitoring method and device, security equipment and household appliance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810234003.XA CN108428316A (en) | 2018-03-21 | 2018-03-21 | Security monitoring method and device, security equipment and household appliance |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108428316A true CN108428316A (en) | 2018-08-21 |
Family
ID=63158785
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810234003.XA Pending CN108428316A (en) | 2018-03-21 | 2018-03-21 | Security monitoring method and device, security equipment and household appliance |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108428316A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112748296A (en) * | 2019-10-31 | 2021-05-04 | 青岛海尔智能技术研发有限公司 | Method and device for monitoring electrical parameters of direct current and direct current household appliance |
CN114782884A (en) * | 2022-03-10 | 2022-07-22 | 慧之安信息技术股份有限公司 | Enhanced identification method and device based on security video monitoring |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020057342A1 (en) * | 2000-11-13 | 2002-05-16 | Takashi Yoshiyama | Surveillance system |
CN1900983A (en) * | 2005-07-19 | 2007-01-24 | 杭州波导软件有限公司 | Wireless anti-theft system |
CN101472021A (en) * | 2007-12-27 | 2009-07-01 | 康佳集团股份有限公司 | System and method for safety monitoring through mobile phone |
CN103680028A (en) * | 2013-12-06 | 2014-03-26 | 阮桂芳 | Remote entrance guard monitoring device |
CN104902242A (en) * | 2015-06-04 | 2015-09-09 | 广东美的制冷设备有限公司 | Anti-theft monitoring air conditioner and monitoring method for air conditioner |
CN106288212A (en) * | 2016-08-22 | 2017-01-04 | 珠海格力电器股份有限公司 | Household safety protection method and device and air conditioner |
CN206271146U (en) * | 2016-12-19 | 2017-06-20 | 成都理工大学 | A kind of computer based intelligent monitor system |
KR101801200B1 (en) * | 2016-02-18 | 2017-11-24 | 호남대학교 산학협력단 | Smart doorbell system |
CN107463920A (en) * | 2017-08-21 | 2017-12-12 | 吉林大学 | A kind of face identification method for eliminating partial occlusion thing and influenceing |
-
2018
- 2018-03-21 CN CN201810234003.XA patent/CN108428316A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020057342A1 (en) * | 2000-11-13 | 2002-05-16 | Takashi Yoshiyama | Surveillance system |
CN1900983A (en) * | 2005-07-19 | 2007-01-24 | 杭州波导软件有限公司 | Wireless anti-theft system |
CN101472021A (en) * | 2007-12-27 | 2009-07-01 | 康佳集团股份有限公司 | System and method for safety monitoring through mobile phone |
CN103680028A (en) * | 2013-12-06 | 2014-03-26 | 阮桂芳 | Remote entrance guard monitoring device |
CN104902242A (en) * | 2015-06-04 | 2015-09-09 | 广东美的制冷设备有限公司 | Anti-theft monitoring air conditioner and monitoring method for air conditioner |
KR101801200B1 (en) * | 2016-02-18 | 2017-11-24 | 호남대학교 산학협력단 | Smart doorbell system |
CN106288212A (en) * | 2016-08-22 | 2017-01-04 | 珠海格力电器股份有限公司 | Household safety protection method and device and air conditioner |
CN206271146U (en) * | 2016-12-19 | 2017-06-20 | 成都理工大学 | A kind of computer based intelligent monitor system |
CN107463920A (en) * | 2017-08-21 | 2017-12-12 | 吉林大学 | A kind of face identification method for eliminating partial occlusion thing and influenceing |
Non-Patent Citations (1)
Title |
---|
杨铁军主编: "《产业专利分析报告(第33册)—智能识别》", 30 June 2015, 知识产权出版社 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112748296A (en) * | 2019-10-31 | 2021-05-04 | 青岛海尔智能技术研发有限公司 | Method and device for monitoring electrical parameters of direct current and direct current household appliance |
CN112748296B (en) * | 2019-10-31 | 2023-05-23 | 青岛海尔智能技术研发有限公司 | Electric parameter monitoring method and device for direct current and direct current household appliance |
CN114782884A (en) * | 2022-03-10 | 2022-07-22 | 慧之安信息技术股份有限公司 | Enhanced identification method and device based on security video monitoring |
CN114782884B (en) * | 2022-03-10 | 2023-03-24 | 慧之安信息技术股份有限公司 | Enhanced identification method and device based on security video monitoring |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107911653A (en) | The module of intelligent video monitoring in institute, system, method and storage medium | |
CN106056833A (en) | Safety monitoring method, device, system and monitoring system | |
CN109684989A (en) | Safety custody method, apparatus, terminal and computer readable storage medium | |
US9679458B2 (en) | Information processing system, information processing apparatus, information processing method, information processing program, portable communication terminal, and control method and control program of portable communication terminal | |
EP2933953A1 (en) | Method and apparatus for home monitoring | |
CN110081983A (en) | Monitoring method, monitoring device, electronic equipment and storage medium | |
WO2016150045A1 (en) | Housebreaking alarm method and device | |
CN107592498B (en) | Cell management method based on intelligent camera and related equipment | |
CN107770244B (en) | Data transmission control method and related product | |
JP2011523106A (en) | Image sensor, alarm system and method for classifying objects and events | |
KR101987241B1 (en) | Complexed event processing base smart monitoring platform and smart monitoring method | |
CN105629947B (en) | Home equipment monitoring method, home equipment monitoring device and terminal | |
CN109544870A (en) | Alarm decision method and intelligent monitor system for intelligent monitor system | |
CN111131478A (en) | Light steel villa monitoring management system | |
WO2023098287A1 (en) | Message pushing method and apparatus, storage medium and electronic apparatus | |
CN108428316A (en) | Security monitoring method and device, security equipment and household appliance | |
CN115567690A (en) | Intelligent monitoring system capable of automatically identifying dangerous points of field operation | |
CN108965067A (en) | Intelligent home equipment control method, intelligent gateway and smart machine | |
CN104967814A (en) | Monitoring equipment interconnection control method and system | |
CN107404635A (en) | The monitoring method and system of a kind of warning message | |
CN105551188A (en) | Realization method for Internet of Thing intelligent device having supervising function | |
CN105872466A (en) | Alarm method and alarm device based on smart TV | |
US10839675B2 (en) | Anti-theft method and apparatus | |
CN108510701B (en) | A kind of intelligent smog alarm method, apparatus and system | |
CN113658399B (en) | Intelligent door lock alarm method, intelligent door lock and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180821 |