CN108806155A - Security-protecting and monitoring method based on Internet of Things - Google Patents
Security-protecting and monitoring method based on Internet of Things Download PDFInfo
- Publication number
- CN108806155A CN108806155A CN201810701562.7A CN201810701562A CN108806155A CN 108806155 A CN108806155 A CN 108806155A CN 201810701562 A CN201810701562 A CN 201810701562A CN 108806155 A CN108806155 A CN 108806155A
- Authority
- CN
- China
- Prior art keywords
- personnel
- unverified
- sound
- security
- protecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
- G08B15/002—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with occupancy simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
The present invention relates to security-protecting and monitoring method technical fields, specially the security-protecting and monitoring method based on Internet of Things, and this approach includes the following steps:Personnel's detecting step detects position and the identity of indoor occupant, judges whether the not verified unverified personnel of identity, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;Simulation plays step, plays preset scenario simulation sound;Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges whether the reaction of unverified personnel is abnormal, if so, executing alarm and reminding step;Alarm and reminding step sends alarm and reminding to preset user equipment.Security-protecting and monitoring method provided by the invention based on Internet of Things can automatically be identified the identity of indoor occupant, solve the problems, such as that existing safety defense monitoring system easy tos produce wrong report in guest access.
Description
Technical field
The present invention relates to security-protecting and monitoring method technical fields, specially the security-protecting and monitoring method based on Internet of Things.
Background technology
In recent years, as people's living standard is continuously improved, people increasingly pay attention to safely family's property.And it is traditional
There are many hidden danger for mechanical household defence system, and traditional Anti-theft door and window is existing for overall beautiful, emergency escape etc.
Insufficient and hidden danger, it is difficult to meet pursuit of the people to higher quality of the life.
Currently, many families are fitted with monitoring system, typically deployment can access the camera of network indoors, with
Realize to indoor video monitoring, however this only to the indoor simple video monitoring of carry out, need people watch video into
Row real time monitoring, cannot automatically be detected indoor design condition, inconvenient for use, some families begin to use intelligent security guard thus
Monitoring system mainly carries out authentication by recognition of face to indoor personnel, once find the people of authentication failed
Member, then alarm, however in real life, interior inevitably has the visitors such as friend, relatives and comes to visit, and this monitoring system needs
Visitor's identity is shifted to an earlier date into typing, otherwise it is easy to appear reporting by mistake, is made troubles to user.
Invention content
The invention is intended to provide the security-protecting and monitoring method based on Internet of Things, the identity of indoor occupant can be known automatically
Not, solve the problems, such as that existing safety defense monitoring system easy tos produce wrong report in guest access.
In order to solve the above-mentioned technical problem, this patent provides the following technical solutions:
Security-protecting and monitoring method based on Internet of Things, includes the following steps:
Personnel's detecting step detects position and the identity of indoor occupant, judges whether that identity is not verified not
Certification personnel, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;
Simulation plays step, plays preset scenario simulation sound;
Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges unverified people
Whether the reaction of member is abnormal, if so, executing alarm and reminding step;
Alarm and reminding step sends alarm and reminding to preset user equipment.
In technical solution of the present invention, after detecting interior there are unverified personnel, preset scenario simulation is played
Sound, then scenario simulation sound indoor someone can be pretended when owner is not in, then played centainly into unverified personnel
Fright effect, while if this unverified personnel is robber or to feel undesirable people, he is hearing scenario simulation
It will produce certain feared state of mind after sound, and then have some abnormal behavior reactions;For example, robber hears that key is opened suddenly
Rapidly direction can be escaped to door and window etc. to move, quickly escape to the direction far from doorway, or quickly immediately after the sound of door
The region that interior, bed bottom of cabinet etc. can hide is gone to hide;And in personnel's analytical procedure, then it is directed to the row of unverified personnel
It is analyzed for reaction, and then judges whether unverified personnel are robbers, and alarm and reminding is sent in time to user equipment.This hair
In bright technical solution, the identity of personnel is judged to the reaction of scenario simulation sound by personnel, when there is friend to come to visit, is not required to
Shift to an earlier date typing user identity, simple and convenient, recognition accuracy is high, rate of false alarm is low, and indoor real time monitoring may be implemented, avoid non-
Method personnel get in, and ensure indoor financial security.
Further, if the reaction for detecting unverified personnel in personnel's analytical procedure marks the personnel there is no exception
Certification personnel are denoted as, and certification reminder is sent to preset user equipment.
Automatically normergic personnel are added in certification personnel, avoid repeating to detect, by certification reminder, can makes
User learns indoor situations in time.
Further, personnel's analytical procedure includes:
Mobile analytical procedure analyzes the moving direction of unverified personnel, mobile speed according to the change in location of unverified personnel
Degree and dwell regions;
Anomaly analysis step, according to the movement of the play position of scenario simulation sound and broadcasting content and unverified personnel
Direction, movement speed and dwell regions judge whether the behavior of unverified personnel is normal.
Mobile behavior of the unverified personnel after hearing scenario simulation sound is analyzed first, then from moving direction, movement
Three aspects of speed and dwell regions may determine that whether the behavior of unverified personnel is abnormal.
Further, the anomaly analysis step includes:
Direction anomaly analysis step, judges whether unverified personnel are directed away from the side of the play position of scenario simulation sound
To, leave indoor direction or moved to the direction in preset region of hiding, if so, executing velocity anomaly analysis step
Suddenly, if it is not, then executing region anomaly analysis step;
Velocity anomaly analytical procedure judges whether the movement speed of unverified personnel is more than preset value, if so, judgement is not
Certification staff response is abnormal, terminates anomaly analysis step, if it is not, then executing region anomaly analysis step;
Region anomaly analysis step, judge the position of unverified personnel whether eventually settle at it is preset hide in region,
If so, judging that unverified staff response is abnormal.
Individual direction exception or velocity anomaly are not enough to illustrate that the behavior of unverified personnel has exception, such as personnel
Quickly run to open the door after hearing enabling sound, its speed is abnormal at this time, but normal when behavior;Or personnel natively exist
Move towards the direction opposite with sound source, after hearing scenario simulation sound, still moved away from the direction of sound, at this time its
Behavior is also normal, and only after personnel hear scenario simulation sound, movement speed becomes faster suddenly, and moving direction is unreasonable
When, that is, provable the people person behavior exist it is abnormal, therefore can be with by direction anomaly analysis step and velocity anomaly analytical procedure
More accurately to judging whether the abnormal behavior of personnel.Selection one is likely to after the personnel such as robber hear sound
Place keeps close, in the present solution, user can be with the region of hiding in some houses of preset in advance, when unverified personnel hear sound
After sound, region of going to hide is gone to stop, it can be said that bright personnel's abnormal behavior, there are problems.
Further, personnel's detecting step includes:
Personnel's sensing step detects the position of each personnel by the way that infrared sensor indoors is arranged;
Personal identification step acquires the facial image of each personnel, and carries out recognition of face successively.
It is combined with recognition of face by infrared sensor, can comprehensively detect indoor personnel's situation.
Further, the facial image of the personnel, the certification can also be shot when being certification personnel by unverified worker labels
Include the facial image of the personnel in prompting.Whether it is friend or relatives that user is facilitated to be differentiated by facial image.
Further, the scenario simulation sound includes enabling sound, bath sound, cooking sound, dialogue sound and sound of snoring, described
The play position of scenario simulation sound is corresponding with its content.Enabling sound, bath sound, cooking sound, dialogue sound, snore sound these all
It is the sound often occurred in life, the play position of scenario simulation sound is corresponding with content can to make scene truer.
Further, the simulation plays in step, and the broadcasting of scenario simulation sound uses voice directional spreading technology so that
Unverified personnel can hear scenario simulation sound.Avoid acoustic impacts by the personnel of authentication.
Further, the reaction of unverified personnel is adjusted there are lamp regulating step, the indicator light is also executed instruction after exception
Step includes the following steps:
Step 1:The position for tracking unverified personnel, judges whether unverified personnel flee from interior, if when, under executing
One step, if it is not, then termination instruction lamp regulating step;
Step 2:The brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, navigation refers to
Show that the navigation terminal of lamp is preset room security.
By reducing the brightness of the emergency exit indicating lamp in corridor and opening preset navigation indicator light so that navigation refers to
Show that lamp is more obvious, and then the attention of the unverified personnel to escape can be attracted, and then will likely be of problems unverified
Personnel guide to room security.
Description of the drawings
Fig. 1 is the logic of the safety defense monitoring system used in the security-protecting and monitoring method embodiment the present invention is based on Internet of Things
Block diagram.
Specific implementation mode
It is further described below by specific implementation mode:
The security-protecting and monitoring method based on Internet of Things of the present embodiment has used safety defense monitoring system as shown in Figure 1, this is
System includes personnel's detection module, simulation playing module, personnel's analysis module, certification reminder module, alarm and reminding module and refers to
Show lamp adjustment module.
Personnel's detection module is used to detect the position of indoor occupant and identity and judges whether that identity is not verified
Unverified personnel.
In the present embodiment, personnel's detection module includes that personnel incude submodule and personal identification submodule, personnel's inductor
Module includes being uniformly arranged on indoor infrared sensor.Personal identification submodule includes image acquisition units and recognition of face list
Member, the detection data that image acquisition units incude submodule according to personnel acquire the facial image of each personnel for face knowledge successively
Other unit carries out recognition of face.It is combined with recognition of face by infrared sensor, can comprehensively detect indoor personnel's situation.
Simulation playing module after detecting interior there are unverified personnel for playing preset scenario simulation sound;This
In embodiment, scenario simulation sound includes enabling sound, bath sound, cooking sound, dialogue sound and sound of snoring, scenario simulation sound
Play position is corresponding with its content.Enabling sound, bath sound, cooking sound, dialogue sound, snore sound these all be life in often go out
Existing sound, the play position of scenario simulation sound is corresponding with content can to make scene truer.In the present embodiment, simulation
Playing module uses voice directional spreading technology, for only allowing unverified personnel that can hear scenario simulation sound.Avoid sound
Influence passes through the personnel of authentication.
Personnel's analysis module hears the behavior reaction after scenario simulation sound for analyzing unverified personnel, and judges not recognize
Whether the reaction of witness person is abnormal;Personnel's analysis module includes mobile analysis submodule and anomaly analysis submodule, mobile analysis
Submodule is used for the change in location according to unverified personnel, analyzes moving direction, movement speed and the stop of unverified personnel
Region.
Anomaly analysis submodule is used for the play position and broadcasting content according to scenario simulation sound and unverified personnel
Moving direction, movement speed and dwell regions, judge whether the reaction of unverified personnel normal.Anomaly analysis submodule includes
Direction anomaly analysis unit, velocity anomaly analytic unit and region anomaly analysis unit:Direction anomaly analysis unit is used for root
It whether is directed away from the direction of the play position of scenario simulation sound according to unverified personnel, leaves indoor direction or to default
The direction in region of hiding carry out mobile judging unverified personnel with the presence or absence of direction exception;Velocity anomaly analytic unit is used for
Whether unverified personnel more than preset value judge unverified personnel there are when the exception of direction, according to the movement speed of unverified personnel
With the presence or absence of velocity anomaly, if then judging unverified personnel, there are abnormal responses;Region anomaly analysis unit is used for according to not
The dwell regions of certification personnel and the preset unverified personnel of region decision of hiding whether there is abnormal response.
Alarm and reminding module is used to send out to preset user equipment after the reaction for detecting unverified personnel is there are exception
It send alarm and reminding, is to send alarm short message to the phone number of user preset in the present embodiment.
Personnel's analysis module is additionally operable to be labeled as the personnel when the reaction for detecting unverified personnel is not present abnormal
Certification personnel, certification reminder module send corresponding certification reminder to preset user equipment.
Certification reminder module is additionally operable to shoot by image acquisition units when unverified personnel are marked as certification personnel
The facial image of the personnel includes the facial image of the personnel in certification reminder.Facilitate user by facial image differentiate whether
For friend or relatives.Automatically normergic personnel are added in certification personnel, avoid repeating to detect, by certification reminder,
User can be made to learn indoor situations in time.
The security-protecting and monitoring method based on Internet of Things of the present embodiment includes the following steps:
Personnel's detecting step detects position and the identity of indoor occupant, judges whether that identity is not verified not
Certification personnel, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;
Simulation plays step, plays preset scenario simulation sound;Scenario simulation sound includes enabling sound, bath sound, fries
Dish sound, dialogue sound and sound of snoring, the play position of scenario simulation sound are corresponding with its content.Enabling sound, bath sound, cooking
Sound, dialogue sound, snore sound these be all the sound that often occurs in life, the play position of scenario simulation sound is opposite with content
Scene should can be made truer.Simulation plays in step, and the broadcasting of scenario simulation sound uses voice directional spreading technology, from
And only unverified personnel is enable to hear scenario simulation sound.Avoid acoustic impacts by the personnel of authentication.
Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges unverified people
Whether the reaction of member is abnormal, if so, executing alarm and reminding step, if it is not, the personnel are then labeled as certification personnel, and executes
Certification reminder step;
Certification reminder step sends certification reminder to preset user equipment;
Alarm and reminding step sends alarm and reminding to preset user equipment.
Wherein, personnel's analytical procedure includes:
Mobile analytical procedure analyzes the moving direction of unverified personnel, mobile speed according to the change in location of unverified personnel
Degree and dwell regions;
Anomaly analysis step, according to the movement of the play position of scenario simulation sound and broadcasting content and unverified personnel
Direction, movement speed and dwell regions judge whether the behavior of unverified personnel is normal.
Anomaly analysis step includes:
Direction anomaly analysis step, judges whether unverified personnel are directed away from the side of the play position of scenario simulation sound
To, leave indoor direction or moved to the direction in preset region of hiding, if so, executing velocity anomaly analysis step
Suddenly, if it is not, then executing region anomaly analysis step;
Velocity anomaly analytical procedure judges whether the movement speed of unverified personnel is more than preset value, if so, judgement is not
Certification staff response is abnormal, terminates anomaly analysis step, if it is not, then executing region anomaly analysis step;
Region anomaly analysis step, judge the position of unverified personnel whether eventually settle at it is preset hide in region,
If so, judging that unverified staff response is abnormal.
Personnel's detecting step includes:
Personnel's sensing step detects the position of each personnel by the way that infrared sensor indoors is arranged;
Personal identification step acquires the facial image of each personnel, and carries out recognition of face successively.
It is combined with recognition of face by infrared sensor, can comprehensively detect indoor personnel's situation.
The facial image of the personnel can be also shot in certification reminder step when unverified personnel are marked as certification personnel,
Include the facial image of the personnel in certification reminder.Whether it is friend or relatives that user is facilitated to be differentiated by facial image.
The reaction of unverified personnel includes following there are lamp regulating step, indicator light regulating step is also executed instruction after exception
Step:
Step 1:The position for tracking unverified personnel, judges whether unverified personnel flee from interior, if when, under executing
One step, if it is not, then termination instruction lamp regulating step;
Step 2:The brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, navigation refers to
Show that the navigation terminal of lamp is preset room security.
In the present embodiment technical solution, simulation playing module plays after detecting interior there are unverified personnel
Preset scenario simulation sound, then scenario simulation sound indoor someone can be pretended when owner is not in, then into unverified
Personnel play the role of certain fright, while if this unverified personnel is robber or feels undesirable people, he
It will produce certain feared state of mind after hearing scenario simulation sound, and then have some abnormal behavior reactions;For example, robber
Can direction movement rapidly be escaped to door and window etc. immediately after hearing the sound that key opens the door suddenly, it is quick to the direction far from doorway
Escape, or quickly go in cabinet, the region that bed bottom etc. can hide is hidden;And personnel's analysis module, then it is directed to not
The behavior reaction of certification personnel is analyzed, and then judges whether unverified personnel are robbers, and is sent in time to user equipment
Alarm and reminding.In technical solution of the present invention, the identity of personnel judged to the reaction of scenario simulation sound by personnel, when there is friend
When friend is visiting, typing user identity need not be shifted to an earlier date, simple and convenient, recognition accuracy is high, rate of false alarm is low, may be implemented indoor real
When monitor, avoid unauthorized person from getting in, ensure indoor financial security.
Mobile behavior of the unverified personnel after hearing scenario simulation sound is analyzed first, then from moving direction, movement
Three aspects of speed and dwell regions may determine that whether the behavior of unverified personnel is abnormal.Individual direction is abnormal or fast
Degree is abnormal to be not enough to illustrate quickly to run to open the door after the behavior of unverified personnel hears enabling sound in the presence of exception, such as personnel, this
When its speed be abnormal, but it is normal when behavior;Or personnel listen natively towards the direction movement opposite with sound source
To after scene simulated sound, still moved away from the direction of sound, its behavior at this time is also normal, only when personnel listen
To after scene simulated sound, movement speed becomes faster suddenly, and when moving direction is unreasonable, that is, behavior of provable the people person exists
It is abnormal, therefore can be more accurately to the abnormal behavior of personnel by direction anomaly analysis unit and velocity anomaly analytic unit
Whether judged.It is likely to one place of selection after the personnel such as robber hear sound to keep close, in the present solution, user can
With the region of hiding in some houses of preset in advance, after unverified personnel hear sound, region of going to hide is gone to stop, then
It can illustrate that the people person's reflex action is abnormal, there are problems.
Indicator light adjustment module connects the indicator lamp control system of entire building, and indicator light adjustment module is for detecting not
After certification personnel flee from interior, the brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, is led
The navigation terminal of boat indicator light is preset room security.By reducing the brightness of the emergency exit indicating lamp in corridor and opening pre-
If navigation indicator light so that navigation indicator light is more obvious, and then can attract the attention of the unverified personnel to escape, into
And will likely unverified personnel of problems guide to room security.
The above are merely the embodiment of the present invention, the common sense such as well known concrete structure and characteristic are not made excessively herein in scheme
Description, all common of technical field that the present invention belongs to before one skilled in the art know the applying date or priority date
Technological know-how can know the prior art all in the field, and with using routine experiment means before the date
Ability, one skilled in the art can improve in conjunction with self-ability under the enlightenment that the application provides and implement we
Case, some typical known features or known method should not become the barrier that one skilled in the art implement the application
Hinder.It should be pointed out that for those skilled in the art, without departing from the structure of the invention, if can also make
Dry modification and improvement, these should also be considered as protection scope of the present invention, these all do not interfere with the effect that the present invention is implemented and
Patent practicability.The scope of protection required by this application should be based on the content of the claims, the specific reality in specification
Apply the content that the records such as mode can be used for explaining claim.
Claims (9)
1. the security-protecting and monitoring method based on Internet of Things, it is characterised in that:Include the following steps:
Personnel's detecting step detects position and the identity of indoor occupant, judges whether not verified unverified of identity
Personnel, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;
Simulation plays step, plays preset scenario simulation sound;
Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges unverified personnel's
Whether reaction is abnormal, if so, executing alarm and reminding step;
Alarm and reminding step sends alarm and reminding to preset user equipment.
2. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:If in personnel's analytical procedure
The reaction of unverified personnel is detected there is no abnormal, then the personnel are labeled as certification personnel, and to preset user equipment
Send certification reminder.
3. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:Personnel's analytical procedure
Including:
Mobile analytical procedure, according to the change in location of unverified personnel, analyze moving direction, the movement speed of unverified personnel with
And dwell regions;
Anomaly analysis step, according to the play position of scenario simulation sound and broadcasting content and the mobile side of unverified personnel
To, movement speed and dwell regions, judge whether the behavior of unverified personnel is normal.
4. the security-protecting and monitoring method according to claim 3 based on Internet of Things, it is characterised in that:The anomaly analysis step
Including:
Direction anomaly analysis step, judge unverified personnel whether be directed away from the play position of scenario simulation sound direction,
It leaves indoor direction or is moved to the direction in preset region of hiding, if so, velocity anomaly analytical procedure is executed,
If it is not, then executing region anomaly analysis step;
Velocity anomaly analytical procedure judges whether the movement speed of unverified personnel is more than preset value, if so, judgement is unverified
Staff response is abnormal, terminates anomaly analysis step, if it is not, then executing region anomaly analysis step;
Region anomaly analysis step, judge the position of unverified personnel whether eventually settle at it is preset hide in region, if so,
Then judge that unverified staff response is abnormal.
5. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:Personnel's detecting step
Including:
Personnel's sensing step detects the position of each personnel by the way that infrared sensor indoors is arranged;
Personal identification step acquires the facial image of each personnel, and carries out recognition of face successively.
6. the security-protecting and monitoring method according to claim 5 based on Internet of Things, it is characterised in that:By unverified worker labels
Also to shoot the facial image of the personnel when certification personnel, the facial image of the personnel is included in the certification reminder.
7. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:The scenario simulation sound
Including enabling sound, bath sound, cooking sound, dialogue sound and sound of snoring, play position and its content of the scenario simulation sound
It is corresponding.
8. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:The simulation plays step
In, the broadcasting of scenario simulation sound uses voice directional spreading technology so that unverified personnel can hear scenario simulation sound.
9. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:The reaction of unverified personnel
There are lamp regulating step is also executed instruction after exception, the indicator light regulating step includes the following steps:
Step 1:The position for tracking unverified personnel, judges whether unverified personnel flee from interior, if when, next step is executed,
If it is not, then termination instruction lamp regulating step;
Step 2:The brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, navigate indicator light
Navigation terminal be preset room security.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810701562.7A CN108806155B (en) | 2018-06-29 | 2018-06-29 | Security monitoring method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810701562.7A CN108806155B (en) | 2018-06-29 | 2018-06-29 | Security monitoring method based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108806155A true CN108806155A (en) | 2018-11-13 |
CN108806155B CN108806155B (en) | 2020-02-11 |
Family
ID=64073518
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810701562.7A Active CN108806155B (en) | 2018-06-29 | 2018-06-29 | Security monitoring method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108806155B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815820A (en) * | 2018-12-26 | 2019-05-28 | 深圳市天彦通信股份有限公司 | Object localization method and relevant apparatus |
CN110992626A (en) * | 2019-11-26 | 2020-04-10 | 宁波奥克斯电气股份有限公司 | Security method based on air conditioner and security air conditioner |
CN114078301A (en) * | 2020-08-17 | 2022-02-22 | 漳州立达信光电子科技有限公司 | Security system, security protection method, security protection device and electronic equipment |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0919050B1 (en) * | 1996-08-06 | 2000-03-22 | Meto International GmbH | Electronic anti-theft element |
CN202584333U (en) * | 2012-05-10 | 2012-12-05 | 何海参 | Infrared monitoring antitheft alarm device |
CN202666216U (en) * | 2012-04-26 | 2013-01-16 | 浙江省江山市浙安消防设备有限公司 | Multifunctional fire-fighting early-warning emergency escape and antitheft monitoring device |
CN203102472U (en) * | 2012-06-28 | 2013-07-31 | 潍坊新控机电科技有限公司 | Base station room alarm and monitoring device |
CN103246869A (en) * | 2013-04-19 | 2013-08-14 | 福建亿榕信息技术有限公司 | Crime monitoring method based on face recognition technology and behavior and sound recognition |
CN203812304U (en) * | 2014-05-10 | 2014-09-03 | 中煤科工集团淮北爆破技术研究院有限公司 | Personal quota monitoring system of entrance guard for manufacturing enterprise of civilian blasting material |
US20150077555A1 (en) * | 2013-07-26 | 2015-03-19 | Joseph Frank Scalisi | Light socket cameras |
CN205230242U (en) * | 2015-12-04 | 2016-05-11 | 重庆财信合同能源管理有限公司 | Intelligent residential district security protection system |
CN105741458A (en) * | 2014-12-08 | 2016-07-06 | 西安扩力机电科技有限公司 | Antitheft alarm device for school computer machine room |
KR20170101643A (en) * | 2016-02-29 | 2017-09-06 | 권장한 | Anti-theft system and method |
CN107393246A (en) * | 2017-08-12 | 2017-11-24 | 宋彦震 | Internet of things intelligent household monitoring system |
CN206907173U (en) * | 2017-04-19 | 2018-01-19 | 重庆工程职业技术学院 | Automatic burglar alarm device based on poultry |
CN107958562A (en) * | 2016-10-14 | 2018-04-24 | 浩思八方科技(北京)有限公司 | A kind of household safe Active Defending System Against and method |
-
2018
- 2018-06-29 CN CN201810701562.7A patent/CN108806155B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0919050B1 (en) * | 1996-08-06 | 2000-03-22 | Meto International GmbH | Electronic anti-theft element |
CN202666216U (en) * | 2012-04-26 | 2013-01-16 | 浙江省江山市浙安消防设备有限公司 | Multifunctional fire-fighting early-warning emergency escape and antitheft monitoring device |
CN202584333U (en) * | 2012-05-10 | 2012-12-05 | 何海参 | Infrared monitoring antitheft alarm device |
CN203102472U (en) * | 2012-06-28 | 2013-07-31 | 潍坊新控机电科技有限公司 | Base station room alarm and monitoring device |
CN103246869A (en) * | 2013-04-19 | 2013-08-14 | 福建亿榕信息技术有限公司 | Crime monitoring method based on face recognition technology and behavior and sound recognition |
US20150077555A1 (en) * | 2013-07-26 | 2015-03-19 | Joseph Frank Scalisi | Light socket cameras |
CN203812304U (en) * | 2014-05-10 | 2014-09-03 | 中煤科工集团淮北爆破技术研究院有限公司 | Personal quota monitoring system of entrance guard for manufacturing enterprise of civilian blasting material |
CN105741458A (en) * | 2014-12-08 | 2016-07-06 | 西安扩力机电科技有限公司 | Antitheft alarm device for school computer machine room |
CN205230242U (en) * | 2015-12-04 | 2016-05-11 | 重庆财信合同能源管理有限公司 | Intelligent residential district security protection system |
KR20170101643A (en) * | 2016-02-29 | 2017-09-06 | 권장한 | Anti-theft system and method |
CN107958562A (en) * | 2016-10-14 | 2018-04-24 | 浩思八方科技(北京)有限公司 | A kind of household safe Active Defending System Against and method |
CN206907173U (en) * | 2017-04-19 | 2018-01-19 | 重庆工程职业技术学院 | Automatic burglar alarm device based on poultry |
CN107393246A (en) * | 2017-08-12 | 2017-11-24 | 宋彦震 | Internet of things intelligent household monitoring system |
Non-Patent Citations (4)
Title |
---|
LINDA LITTLE: "Private whispers/public eyes:Is receiving highly personal information in a public place stressful?", 《INTERACTING WITH COMPUTERS》 * |
任昊: "面向入室盗窃的家庭防盗设施设计", 《中国优秀硕士学位论文全文数据库工程科技Ⅱ辑》 * |
卢俊生: "犯罪体态语探微", 《公安大学学报》 * |
李昊原: "犯罪嫌疑人虚假供述的肢体语言研究", 《中国优秀硕士学位论文全文数据库社会科学Ⅰ辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815820A (en) * | 2018-12-26 | 2019-05-28 | 深圳市天彦通信股份有限公司 | Object localization method and relevant apparatus |
CN110992626A (en) * | 2019-11-26 | 2020-04-10 | 宁波奥克斯电气股份有限公司 | Security method based on air conditioner and security air conditioner |
CN114078301A (en) * | 2020-08-17 | 2022-02-22 | 漳州立达信光电子科技有限公司 | Security system, security protection method, security protection device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108806155B (en) | 2020-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3012813B1 (en) | Event detection system | |
CN108806155A (en) | Security-protecting and monitoring method based on Internet of Things | |
CN109413369A (en) | A kind of monitor video intellectual analysis early warning platform | |
WO2017080434A1 (en) | Intelligent building monitoring method based on face recognition | |
CN108922101B (en) | A kind of several Hisense's breath intelligent security guard Campus Management Systems | |
CN108898717A (en) | A kind of intelligent safety defense monitoring system | |
US20060225352A1 (en) | Method and device for pass-through control and/or singling-out of persons | |
CN105488888A (en) | Intelligent entrance guard system | |
CN117371872A (en) | Intelligent management method and platform for intelligent building | |
US11164414B2 (en) | System and method for providing secure access | |
CN114566023A (en) | Emergency alarm system for school | |
KR20140122616A (en) | Access Control system and method | |
KR101262363B1 (en) | Entrance control system | |
JP2011227679A (en) | Notification device | |
CN111666780A (en) | Intelligent door control security method based on emotion recognition technology | |
JP2019212020A (en) | Evacuation guide server, evacuation guide system and evacuation guide method | |
CN109920112A (en) | A kind of Development of intelligent laboratory | |
CN212933288U (en) | Safety control platform system for intelligent elevator | |
JP4220322B2 (en) | Intruder monitoring method and apparatus | |
CN208506834U (en) | A kind of building security system | |
CN109785567B (en) | Centralized prompting device for fireproof door and fireproof door system | |
JP2011227675A (en) | Notification device | |
CN110895686A (en) | On-duty identification method for special person of fire-fighting person | |
US20240161590A1 (en) | Light switch systems configured to respond to gunfire and methods of use | |
CN112000021A (en) | Household intelligent household control method based on new generation information technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |