CN108510704B - office security method - Google Patents

office security method Download PDF

Info

Publication number
CN108510704B
CN108510704B CN201810526623.0A CN201810526623A CN108510704B CN 108510704 B CN108510704 B CN 108510704B CN 201810526623 A CN201810526623 A CN 201810526623A CN 108510704 B CN108510704 B CN 108510704B
Authority
CN
China
Prior art keywords
security
office
equipment
defense
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810526623.0A
Other languages
Chinese (zh)
Other versions
CN108510704A (en
Inventor
黄召戎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaxiang Xiangneng Technology Co Ltd
Original Assignee
Huaxiang Xiangneng Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaxiang Xiangneng Electric Co Ltd filed Critical Huaxiang Xiangneng Electric Co Ltd
Priority to CN201810526623.0A priority Critical patent/CN108510704B/en
Publication of CN108510704A publication Critical patent/CN108510704A/en
Application granted granted Critical
Publication of CN108510704B publication Critical patent/CN108510704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems

Abstract

The invention discloses office security methods, which include judging whether an infrared mobile detector detects human movement within preset time when a fingerprint lock is closed and a next shift mode is selected, if so, starting a camera near the infrared mobile detector to take pictures and carrying out face recognition on the pictures, if not, starting an alarm, if not, closing a power supply of common equipment, setting the security equipment to enter a defense state, and setting the security equipment to be in a defense withdrawing state within second preset time before the next shift time, wherein the common equipment includes at least of lighting equipment, an air conditioner or a water dispenser, and the security equipment includes magnetic, a smoke alarm, a camera and the infrared mobile detector.

Description

office security method
Technical Field
The invention relates to the technical field of security, in particular to office security methods.
Background
A Security System is a System which provides safe living and working environments for people by using various scientific technologies such as audio and video, infrared, detection, microwave, control, communication and the like and various Security products and equipment, achieves the effects of early warning, post control and processing, and protects the safety of people, lives and properties inside and outside buildings (buildings, districts and factories).
At present, a safety precaution system is a system combining technology and civil air defense, the defects of the civil air defense are made up by using an advanced technology and defense system, and the safety degree of the life and working environment of people is improved by using scientific and technical means. However, as for the defense system in the existing security system, the defense system is still in the stages of video monitoring, infrared and microwave detection and sound alarm, and has no effective real-time intelligent identification, reasonable defense deployment and withdrawal functions. Therefore, the existing security system needs to have high-quality security personnel with strict training and training besides a technical security system, and the function of a civil defense system is strengthened, so that the cost investment in the aspects of manpower, material resources and the like is increased.
Disclosure of Invention
The invention mainly aims to provide office security methods, and aims to solve the problem that the existing security system cannot effectively and intelligently identify, reasonably deploy and withdraw defense in real time.
In order to achieve the purpose, the invention provides office security methods, which comprise the following steps:
when the fingerprint lock is closed and the off duty mode is selected, whether the infrared mobile detector detects human body movement within preset time is judged;
if yes, starting a camera near the infrared mobile detector to shoot a picture, carrying out face recognition on the picture, and starting an alarm when non-company man-hour exists in the picture;
if not, the power supply of the common equipment is turned off, the security equipment is set to enter a defense deployment state, and the security equipment is set to be in a defense withdrawal state at a second preset time before working time, wherein the common equipment comprises at least types of lighting equipment, an air conditioner or a water dispenser, and the security equipment comprises magnetic, smoke alarm, camera and infrared mobile detector.
Preferably, the office security method includes:
when in a defense state, the magnet or the infrared mobile detector detects illegal invasion of a person, an alarm is started and the camera is started, and monitoring data shot by the camera is transmitted to the mobile terminal.
Preferably, the office security method includes:
when the smoke alarm detects that the smoke concentration reaches a threshold value in a defense deployment state, the smoke alarm is started and a preset call is dialed, wherein the smoke alarm is arranged beside a high-power electric appliance and/or in a smoking area.
Preferably, the office security method includes:
when the fingerprint lock is unlocked and the work mode is selected, the lighting device, the air conditioner, the water dispenser, the curtain motor and the window opener work.
Preferably, the office is divided into a plurality of areas, the areas comprise important areas and walking areas, the important areas are provided with the magnetic and glass breaking detectors, the glass breaking detectors are arranged beside windows, the walking areas are provided with the infrared mobile detectors, the important areas comprise a president office, a general manager office and/or a financial office, and the walking areas comprise corridor passageways, peripheral balconies and/or a front desk.
Preferably, the office is provided with a main account for controlling all the devices in the office; and each area is provided with a corresponding sub account for controlling the equipment of the area.
In the technical scheme provided by the invention, when the closing and off-duty modes of the fingerprint lock are selected, a preparation stage of a defense setting state is entered, and in the preparation stage, different states such as alarming, defense setting or no treatment are entered by identifying whether a human body moves in an office or not and whether the human body is a company employee or not.
Drawings
FIG. 1 is a schematic flow chart diagram illustrating an embodiment of an office security method ;
the objects, features, and advantages of the present invention are further described in with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, an embodiment of an office security method of the present invention is disclosed, where the office security method includes:
s100, when the fingerprint lock is closed and the off duty mode is selected, judging whether the infrared mobile detector detects human body movement within preset time;
specifically, with the fingerprint lock as the linkage trigger source, when the fingerprint lock is closed, generally indicates that the last employees leave the company, but it may also be locks are closed by mistake, and in order to avoid false triggering caused by locks being closed by mistake, the last employees need to enter the preparation stage of arming by clicking the off-duty mode through a touch screen or a mobile terminal on .
In the preparation stage of defense deployment, namely hours after the off duty mode is clicked, is set to 10-30 minutes generally, and whether a human body moves in an office is judged through an infrared mobile detector, so that the situation that employees or intruders are left in the office is avoided.
When the infrared mobile detector detects that the human body moves within the preset time of , step S200 is executed, a camera near the infrared mobile detector is started to shoot a picture, face recognition is carried out on the picture, and when non-company man hours exist in the picture, an alarm is started.
Specifically, when the infrared movement detector detects that a human body moves, is carried out to judge whether the person is a company employee or not through human image recognition, so that security is ensured.
When the person is a company worker, the person does not enter the arming state, and when the next time the fingerprint lock is closed and the next working mode is selected, the person again determines whether the infrared movement detector detects the movement of the human body within the preset time of , and the process goes to step S100.
When the person is not a company employee, an alarm is activated, such as a whistle, a telephone call to property, or a picture of the intruder is transmitted to the administrator, who operates on the basis of the identity of the intruder.
, storing the images of the people to be protected, when the intruder is identified as the people to be protected, dialing the alarm phone directly, transmitting the face identification result to the public security organization and/or the manager in the form of information, controlling the window opener to work to close the window to prevent the intruder from escaping from the window, controlling the curtain motor to work to open the curtain to facilitate the public security personnel to observe the condition in the office from the outside, controlling the fingerprint lock of the office to lock to prevent the intruder from escaping from the big , controlling the of the important area to close automatically to prevent the intruder from stealing important data and articles, wherein the important area includes president office, general manager office and/or financial office.
When the infrared mobile detector does not detect the movement of the human body within the preset time of , executing step S300, turning off the power supply of the common equipment, setting the security equipment to enter the arming state, and setting the security equipment to be in the disarming state within the second preset time before the working time, wherein the common equipment comprises at least types of lighting equipment, air conditioners or water dispensers, and the security equipment comprises magnetic, smoke alarms, cameras and infrared mobile detectors.
Specifically, when no human body movement is detected within hours after the current working mode is selected, it indicates that no staff or intruders exist in the office, at this time, the light, the air conditioner and other electric appliances are turned off, so that the effects of saving energy and avoiding accidents such as fire and the like are achieved, the security equipment also enters a defense state, namely, at this time, the security equipment is in a state of being triggered to give an alarm.
In the technical scheme provided by the invention, when the closing and off-duty modes of the fingerprint lock are selected, a preparation stage of a defense setting state is entered, and in the preparation stage, different states such as alarming, defense setting or no treatment are entered by identifying whether a human body moves in an office or not and whether the human body is a company employee or not.
In another embodiment of the present invention, the office security method includes:
and S400, when the magnetic or infrared mobile detector detects illegal invasion of a person in a defense state, starting an alarm and the camera, and transmitting monitoring data shot by the camera to the mobile terminal.
Specifically, when the defense state is illegally invaded, the system detects and alarms, sends alarm information, calls an alarm for an administrator or property to alarm, monitors, captures and stores the field condition, watches and monitors the real-time condition through a mobile phone, and processes the real-time condition.
, the office security method comprises:
and S500, when the smoke alarm detects that the smoke concentration reaches a threshold value in a defense deployment state, starting the alarm and making a preset call, wherein the smoke alarm is arranged beside a high-power electric appliance and/or in a smoking area.
In yet another embodiment of the present invention, the office security method includes:
step S600, when the fingerprint lock is unlocked and the work mode is selected, the lighting equipment, the air conditioner, the water dispenser, the curtain motor and the window opener work.
Specifically, th employee coming from the company clicks the whole-house working mode, the front desk lamp of the company is turned on, all the water dispensers are powered on to boil water, the computer is powered on to enter a starting state at any time, the air conditioner is turned on, the temperature is adjusted to be proper, and the window is opened for ventilation.
Preferably, the office is divided into a plurality of areas, the areas comprise important areas and walking areas, the important areas are provided with the magnetic and glass breaking detectors, the glass breaking detectors are arranged beside windows, the walking areas are provided with the infrared mobile detectors, and the walking areas comprise corridor passageways, peripheral balconies and/or front desks.
Preferably, the office is provided with a main account for controlling all the devices in the office; and each area is provided with a corresponding sub account for controlling the equipment of the area. Specifically, the entire floor of the office is the primary account. Each room zone is a sub-account. The main account is a general administrator of all system equipment, and the whole house centralized control is realized. And establishing independent sub-accounts for each room area. Each room zone can be independently controlled. And the employees in the specified room can log in the specified sub-account to control the equipment in the room.
In addition, user authority management is also provided. The user authority is divided into a high-level administrator and a general user. Senior managers can add equipment, set scenes and independently design the linkage scene of the whole office. The ordinary user can only control the equipment in the room of the area where the ordinary user is located.
In the description herein, reference to the terms " embodiment," "another embodiment," "other embodiments," or " th through xth embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least embodiments or examples of the invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises an series of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Based on the understanding that the technical solution of the present invention per se or parts contributing to the prior art can be embodied in the form of software products stored in storage media (such as ROM/RAM, magnetic disk, optical disk) and including instructions for causing terminals (which may be mobile phones, computers, servers, air conditioners, or network devices, etc.) to execute the methods described in the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (5)

1, office security protection method, characterized by that, including the following steps:
when the fingerprint lock is closed and the off duty mode is selected, whether the infrared mobile detector detects human body movement within preset time is judged;
if not, the power supply of the common equipment is turned off, the security equipment is set to enter a defense deployment state, and the security equipment is set to be in a defense withdrawal state at a second preset time before working time, wherein the common equipment comprises at least types of lighting equipment, an air conditioner or a water dispenser, and the security equipment comprises magnetic, smoke alarm, camera and infrared mobile detector;
if so, starting a camera near the infrared mobile detector to shoot a picture, and carrying out face recognition on the picture;
when the fact that non-company workers work in the picture is found, an alarm is started, meanwhile, the picture is judged , wherein portrait of a precautionary crowd is stored in a database, when the picture is identified as the precautionary crowd, an alarm call is directly dialed, and a face identification result is transmitted to a public security organization and/or a manager in an information form;
when the picture is found to correspond to the working hours of the company, the company does not enter a defense state, when the fingerprint lock is closed again and the off duty mode is selected, whether the infrared movement detector detects human body movement within preset time is judged;
when the fingerprint lock is unlocked and the work mode is selected, the lighting device, the air conditioner, the water dispenser, the curtain motor and the window opener work.
2. The office security method of claim 1, wherein the office security method comprises:
when in a defense state, the magnet or the infrared mobile detector detects illegal invasion of a person, an alarm is started and the camera is started, and monitoring data shot by the camera is transmitted to the mobile terminal.
3. The office security method of claim 1, wherein the office security method comprises:
when the smoke alarm detects that the smoke concentration reaches a threshold value in a defense deployment state, the smoke alarm is started and a preset call is dialed, wherein the smoke alarm is arranged beside a high-power electric appliance and/or in a smoking area.
4. An office security method according to any of , wherein the area comprises a walking area, the important area is provided with the magnetic and glass breaking detector, the glass breaking detector is arranged beside a window, the walking area is provided with the infrared movement detector, and the walking area comprises a corridor passageway, a peripheral balcony and/or a front desk.
5. An office security method as claimed in claim 4, wherein the office is configured with a primary account for controlling all devices in the office; and each area is provided with a corresponding sub account for controlling the equipment of the area.
CN201810526623.0A 2018-05-22 2018-05-22 office security method Active CN108510704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810526623.0A CN108510704B (en) 2018-05-22 2018-05-22 office security method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810526623.0A CN108510704B (en) 2018-05-22 2018-05-22 office security method

Publications (2)

Publication Number Publication Date
CN108510704A CN108510704A (en) 2018-09-07
CN108510704B true CN108510704B (en) 2020-01-31

Family

ID=63401712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810526623.0A Active CN108510704B (en) 2018-05-22 2018-05-22 office security method

Country Status (1)

Country Link
CN (1) CN108510704B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102074100A (en) * 2009-11-20 2011-05-25 上海玄烨电子系统工程有限公司 Intelligent linked alarm system and alarm method thereof
CN103198632A (en) * 2013-04-09 2013-07-10 姚争辉 Indoor security and protection system achieving intelligent human-body identification and master identification
CN203350973U (en) * 2013-05-24 2013-12-18 成都聪慧物联网技术有限公司 Intelligent control system for offices
CN103794015A (en) * 2013-12-16 2014-05-14 柳州博泽科技有限公司 Smart anti-theft system
CN204010138U (en) * 2013-12-30 2014-12-10 北京兴科迪科技有限公司 A kind of bank unattended intelligent device
US10235822B2 (en) * 2014-04-25 2019-03-19 Vivint, Inc. Automatic system access using facial recognition
CN105321278B (en) * 2015-12-07 2018-01-02 黑龙江联益智能系统股份有限公司 Internet of Things antitheft security system
CN206557951U (en) * 2016-12-19 2017-10-13 西安丁子电子信息科技有限公司 Intelligent household security system

Also Published As

Publication number Publication date
CN108510704A (en) 2018-09-07

Similar Documents

Publication Publication Date Title
US10100556B2 (en) Door and home security system and method
CN103268680B (en) A kind of family intelligent monitoring burglary-resisting system
US20070182540A1 (en) Local verification systems and methods for security monitoring
CN107130889A (en) A kind of intelligent door and its method of work
KR20150052974A (en) Integrated door lock type Smart door and its control method
CN111212274A (en) Intelligent building security system
CN206039764U (en) House security monitoring system
CN110335437A (en) A kind of wisdom house security system based on block chain
CN112532920A (en) Construction site system intelligent monitoring implementation method and system
CN210428772U (en) Home security system serving solitary people
CN108510704B (en) office security method
WO2019224658A1 (en) Scalable biometric alarm system with artificial intelligence
CN105156002A (en) Intelligent door and window control device
CN112598862A (en) Security monitoring and early warning system for smart home
CN211144038U (en) Remote monitoring device for intelligent door lock based on Bluetooth 5.0 control
US10777055B1 (en) Displaying event video on a device
CN103839389A (en) Wireless anti-theft alarm system
CN205788377U (en) A kind of transformer station access control system
CN210129251U (en) Access control with edge recognition
KR100803951B1 (en) Rfid security equipment for preventing household entrance crime by false personation employee
JPH11134569A (en) Burglar prevention device
CN108305362A (en) Safety monitoring equipment centralized control system
CN106331658A (en) Cellphone remote video monitoring anti-theft system based on wireless network
CN107476749A (en) A kind of New intellectual burglar-proof door
CN211906472U (en) Building control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 413002 No. 1 Xuefu Road West, Longling Industrial Park, Heshan District, Yiyang City, Hunan Province

Applicant after: Hunan Shengkai Information Technology Co., Ltd.

Address before: 413002 No. 1 Xuefu Road West, Longling Industrial Park, Heshan District, Yiyang City, Hunan Province

Applicant before: Huaxiang energy (Hunan) Energy Technology Co., Ltd.

TA01 Transfer of patent application right

Effective date of registration: 20190613

Address after: 413002 No. 1 Xuefu Road West, Longling Industrial Park, Heshan District, Yiyang City, Hunan Province

Applicant after: HXXN ELECTRICITY CO., LTD.

Address before: 413002 No. 1 Xuefu Road West, Longling Industrial Park, Heshan District, Yiyang City, Hunan Province

Applicant before: Hunan Shengkai Information Technology Co., Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 413002 Yiyang City, Hunan province Heshan District Long Ridge Industrial Park, West Road, No. 1

Patentee after: Huaxiang XiangNeng Technology Co.,Ltd.

Address before: 413002 Yiyang City, Hunan province Heshan District Long Ridge Industrial Park, West Road, No. 1

Patentee before: HXXN ELECTRICITY Co.,Ltd.

CP01 Change in the name or title of a patent holder