CN108806155A - Security-protecting and monitoring method based on Internet of Things - Google Patents

Security-protecting and monitoring method based on Internet of Things Download PDF

Info

Publication number
CN108806155A
CN108806155A CN201810701562.7A CN201810701562A CN108806155A CN 108806155 A CN108806155 A CN 108806155A CN 201810701562 A CN201810701562 A CN 201810701562A CN 108806155 A CN108806155 A CN 108806155A
Authority
CN
China
Prior art keywords
personnel
unverified
sound
security
protecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810701562.7A
Other languages
Chinese (zh)
Other versions
CN108806155B (en
Inventor
余洪科
余忠保
刘秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Renhuai City Yun Xia Network Technology Co Ltd
Original Assignee
Renhuai City Yun Xia Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Renhuai City Yun Xia Network Technology Co Ltd filed Critical Renhuai City Yun Xia Network Technology Co Ltd
Priority to CN201810701562.7A priority Critical patent/CN108806155B/en
Publication of CN108806155A publication Critical patent/CN108806155A/en
Application granted granted Critical
Publication of CN108806155B publication Critical patent/CN108806155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/002Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with occupancy simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention relates to security-protecting and monitoring method technical fields, specially the security-protecting and monitoring method based on Internet of Things, and this approach includes the following steps:Personnel's detecting step detects position and the identity of indoor occupant, judges whether the not verified unverified personnel of identity, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;Simulation plays step, plays preset scenario simulation sound;Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges whether the reaction of unverified personnel is abnormal, if so, executing alarm and reminding step;Alarm and reminding step sends alarm and reminding to preset user equipment.Security-protecting and monitoring method provided by the invention based on Internet of Things can automatically be identified the identity of indoor occupant, solve the problems, such as that existing safety defense monitoring system easy tos produce wrong report in guest access.

Description

Security-protecting and monitoring method based on Internet of Things
Technical field
The present invention relates to security-protecting and monitoring method technical fields, specially the security-protecting and monitoring method based on Internet of Things.
Background technology
In recent years, as people's living standard is continuously improved, people increasingly pay attention to safely family's property.And it is traditional There are many hidden danger for mechanical household defence system, and traditional Anti-theft door and window is existing for overall beautiful, emergency escape etc. Insufficient and hidden danger, it is difficult to meet pursuit of the people to higher quality of the life.
Currently, many families are fitted with monitoring system, typically deployment can access the camera of network indoors, with Realize to indoor video monitoring, however this only to the indoor simple video monitoring of carry out, need people watch video into Row real time monitoring, cannot automatically be detected indoor design condition, inconvenient for use, some families begin to use intelligent security guard thus Monitoring system mainly carries out authentication by recognition of face to indoor personnel, once find the people of authentication failed Member, then alarm, however in real life, interior inevitably has the visitors such as friend, relatives and comes to visit, and this monitoring system needs Visitor's identity is shifted to an earlier date into typing, otherwise it is easy to appear reporting by mistake, is made troubles to user.
Invention content
The invention is intended to provide the security-protecting and monitoring method based on Internet of Things, the identity of indoor occupant can be known automatically Not, solve the problems, such as that existing safety defense monitoring system easy tos produce wrong report in guest access.
In order to solve the above-mentioned technical problem, this patent provides the following technical solutions:
Security-protecting and monitoring method based on Internet of Things, includes the following steps:
Personnel's detecting step detects position and the identity of indoor occupant, judges whether that identity is not verified not Certification personnel, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;
Simulation plays step, plays preset scenario simulation sound;
Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges unverified people Whether the reaction of member is abnormal, if so, executing alarm and reminding step;
Alarm and reminding step sends alarm and reminding to preset user equipment.
In technical solution of the present invention, after detecting interior there are unverified personnel, preset scenario simulation is played Sound, then scenario simulation sound indoor someone can be pretended when owner is not in, then played centainly into unverified personnel Fright effect, while if this unverified personnel is robber or to feel undesirable people, he is hearing scenario simulation It will produce certain feared state of mind after sound, and then have some abnormal behavior reactions;For example, robber hears that key is opened suddenly Rapidly direction can be escaped to door and window etc. to move, quickly escape to the direction far from doorway, or quickly immediately after the sound of door The region that interior, bed bottom of cabinet etc. can hide is gone to hide;And in personnel's analytical procedure, then it is directed to the row of unverified personnel It is analyzed for reaction, and then judges whether unverified personnel are robbers, and alarm and reminding is sent in time to user equipment.This hair In bright technical solution, the identity of personnel is judged to the reaction of scenario simulation sound by personnel, when there is friend to come to visit, is not required to Shift to an earlier date typing user identity, simple and convenient, recognition accuracy is high, rate of false alarm is low, and indoor real time monitoring may be implemented, avoid non- Method personnel get in, and ensure indoor financial security.
Further, if the reaction for detecting unverified personnel in personnel's analytical procedure marks the personnel there is no exception Certification personnel are denoted as, and certification reminder is sent to preset user equipment.
Automatically normergic personnel are added in certification personnel, avoid repeating to detect, by certification reminder, can makes User learns indoor situations in time.
Further, personnel's analytical procedure includes:
Mobile analytical procedure analyzes the moving direction of unverified personnel, mobile speed according to the change in location of unverified personnel Degree and dwell regions;
Anomaly analysis step, according to the movement of the play position of scenario simulation sound and broadcasting content and unverified personnel Direction, movement speed and dwell regions judge whether the behavior of unverified personnel is normal.
Mobile behavior of the unverified personnel after hearing scenario simulation sound is analyzed first, then from moving direction, movement Three aspects of speed and dwell regions may determine that whether the behavior of unverified personnel is abnormal.
Further, the anomaly analysis step includes:
Direction anomaly analysis step, judges whether unverified personnel are directed away from the side of the play position of scenario simulation sound To, leave indoor direction or moved to the direction in preset region of hiding, if so, executing velocity anomaly analysis step Suddenly, if it is not, then executing region anomaly analysis step;
Velocity anomaly analytical procedure judges whether the movement speed of unverified personnel is more than preset value, if so, judgement is not Certification staff response is abnormal, terminates anomaly analysis step, if it is not, then executing region anomaly analysis step;
Region anomaly analysis step, judge the position of unverified personnel whether eventually settle at it is preset hide in region, If so, judging that unverified staff response is abnormal.
Individual direction exception or velocity anomaly are not enough to illustrate that the behavior of unverified personnel has exception, such as personnel Quickly run to open the door after hearing enabling sound, its speed is abnormal at this time, but normal when behavior;Or personnel natively exist Move towards the direction opposite with sound source, after hearing scenario simulation sound, still moved away from the direction of sound, at this time its Behavior is also normal, and only after personnel hear scenario simulation sound, movement speed becomes faster suddenly, and moving direction is unreasonable When, that is, provable the people person behavior exist it is abnormal, therefore can be with by direction anomaly analysis step and velocity anomaly analytical procedure More accurately to judging whether the abnormal behavior of personnel.Selection one is likely to after the personnel such as robber hear sound Place keeps close, in the present solution, user can be with the region of hiding in some houses of preset in advance, when unverified personnel hear sound After sound, region of going to hide is gone to stop, it can be said that bright personnel's abnormal behavior, there are problems.
Further, personnel's detecting step includes:
Personnel's sensing step detects the position of each personnel by the way that infrared sensor indoors is arranged;
Personal identification step acquires the facial image of each personnel, and carries out recognition of face successively.
It is combined with recognition of face by infrared sensor, can comprehensively detect indoor personnel's situation.
Further, the facial image of the personnel, the certification can also be shot when being certification personnel by unverified worker labels Include the facial image of the personnel in prompting.Whether it is friend or relatives that user is facilitated to be differentiated by facial image.
Further, the scenario simulation sound includes enabling sound, bath sound, cooking sound, dialogue sound and sound of snoring, described The play position of scenario simulation sound is corresponding with its content.Enabling sound, bath sound, cooking sound, dialogue sound, snore sound these all It is the sound often occurred in life, the play position of scenario simulation sound is corresponding with content can to make scene truer.
Further, the simulation plays in step, and the broadcasting of scenario simulation sound uses voice directional spreading technology so that Unverified personnel can hear scenario simulation sound.Avoid acoustic impacts by the personnel of authentication.
Further, the reaction of unverified personnel is adjusted there are lamp regulating step, the indicator light is also executed instruction after exception Step includes the following steps:
Step 1:The position for tracking unverified personnel, judges whether unverified personnel flee from interior, if when, under executing One step, if it is not, then termination instruction lamp regulating step;
Step 2:The brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, navigation refers to Show that the navigation terminal of lamp is preset room security.
By reducing the brightness of the emergency exit indicating lamp in corridor and opening preset navigation indicator light so that navigation refers to Show that lamp is more obvious, and then the attention of the unverified personnel to escape can be attracted, and then will likely be of problems unverified Personnel guide to room security.
Description of the drawings
Fig. 1 is the logic of the safety defense monitoring system used in the security-protecting and monitoring method embodiment the present invention is based on Internet of Things Block diagram.
Specific implementation mode
It is further described below by specific implementation mode:
The security-protecting and monitoring method based on Internet of Things of the present embodiment has used safety defense monitoring system as shown in Figure 1, this is System includes personnel's detection module, simulation playing module, personnel's analysis module, certification reminder module, alarm and reminding module and refers to Show lamp adjustment module.
Personnel's detection module is used to detect the position of indoor occupant and identity and judges whether that identity is not verified Unverified personnel.
In the present embodiment, personnel's detection module includes that personnel incude submodule and personal identification submodule, personnel's inductor Module includes being uniformly arranged on indoor infrared sensor.Personal identification submodule includes image acquisition units and recognition of face list Member, the detection data that image acquisition units incude submodule according to personnel acquire the facial image of each personnel for face knowledge successively Other unit carries out recognition of face.It is combined with recognition of face by infrared sensor, can comprehensively detect indoor personnel's situation.
Simulation playing module after detecting interior there are unverified personnel for playing preset scenario simulation sound;This In embodiment, scenario simulation sound includes enabling sound, bath sound, cooking sound, dialogue sound and sound of snoring, scenario simulation sound Play position is corresponding with its content.Enabling sound, bath sound, cooking sound, dialogue sound, snore sound these all be life in often go out Existing sound, the play position of scenario simulation sound is corresponding with content can to make scene truer.In the present embodiment, simulation Playing module uses voice directional spreading technology, for only allowing unverified personnel that can hear scenario simulation sound.Avoid sound Influence passes through the personnel of authentication.
Personnel's analysis module hears the behavior reaction after scenario simulation sound for analyzing unverified personnel, and judges not recognize Whether the reaction of witness person is abnormal;Personnel's analysis module includes mobile analysis submodule and anomaly analysis submodule, mobile analysis Submodule is used for the change in location according to unverified personnel, analyzes moving direction, movement speed and the stop of unverified personnel Region.
Anomaly analysis submodule is used for the play position and broadcasting content according to scenario simulation sound and unverified personnel Moving direction, movement speed and dwell regions, judge whether the reaction of unverified personnel normal.Anomaly analysis submodule includes Direction anomaly analysis unit, velocity anomaly analytic unit and region anomaly analysis unit:Direction anomaly analysis unit is used for root It whether is directed away from the direction of the play position of scenario simulation sound according to unverified personnel, leaves indoor direction or to default The direction in region of hiding carry out mobile judging unverified personnel with the presence or absence of direction exception;Velocity anomaly analytic unit is used for Whether unverified personnel more than preset value judge unverified personnel there are when the exception of direction, according to the movement speed of unverified personnel With the presence or absence of velocity anomaly, if then judging unverified personnel, there are abnormal responses;Region anomaly analysis unit is used for according to not The dwell regions of certification personnel and the preset unverified personnel of region decision of hiding whether there is abnormal response.
Alarm and reminding module is used to send out to preset user equipment after the reaction for detecting unverified personnel is there are exception It send alarm and reminding, is to send alarm short message to the phone number of user preset in the present embodiment.
Personnel's analysis module is additionally operable to be labeled as the personnel when the reaction for detecting unverified personnel is not present abnormal Certification personnel, certification reminder module send corresponding certification reminder to preset user equipment.
Certification reminder module is additionally operable to shoot by image acquisition units when unverified personnel are marked as certification personnel The facial image of the personnel includes the facial image of the personnel in certification reminder.Facilitate user by facial image differentiate whether For friend or relatives.Automatically normergic personnel are added in certification personnel, avoid repeating to detect, by certification reminder, User can be made to learn indoor situations in time.
The security-protecting and monitoring method based on Internet of Things of the present embodiment includes the following steps:
Personnel's detecting step detects position and the identity of indoor occupant, judges whether that identity is not verified not Certification personnel, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;
Simulation plays step, plays preset scenario simulation sound;Scenario simulation sound includes enabling sound, bath sound, fries Dish sound, dialogue sound and sound of snoring, the play position of scenario simulation sound are corresponding with its content.Enabling sound, bath sound, cooking Sound, dialogue sound, snore sound these be all the sound that often occurs in life, the play position of scenario simulation sound is opposite with content Scene should can be made truer.Simulation plays in step, and the broadcasting of scenario simulation sound uses voice directional spreading technology, from And only unverified personnel is enable to hear scenario simulation sound.Avoid acoustic impacts by the personnel of authentication.
Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges unverified people Whether the reaction of member is abnormal, if so, executing alarm and reminding step, if it is not, the personnel are then labeled as certification personnel, and executes Certification reminder step;
Certification reminder step sends certification reminder to preset user equipment;
Alarm and reminding step sends alarm and reminding to preset user equipment.
Wherein, personnel's analytical procedure includes:
Mobile analytical procedure analyzes the moving direction of unverified personnel, mobile speed according to the change in location of unverified personnel Degree and dwell regions;
Anomaly analysis step, according to the movement of the play position of scenario simulation sound and broadcasting content and unverified personnel Direction, movement speed and dwell regions judge whether the behavior of unverified personnel is normal.
Anomaly analysis step includes:
Direction anomaly analysis step, judges whether unverified personnel are directed away from the side of the play position of scenario simulation sound To, leave indoor direction or moved to the direction in preset region of hiding, if so, executing velocity anomaly analysis step Suddenly, if it is not, then executing region anomaly analysis step;
Velocity anomaly analytical procedure judges whether the movement speed of unverified personnel is more than preset value, if so, judgement is not Certification staff response is abnormal, terminates anomaly analysis step, if it is not, then executing region anomaly analysis step;
Region anomaly analysis step, judge the position of unverified personnel whether eventually settle at it is preset hide in region, If so, judging that unverified staff response is abnormal.
Personnel's detecting step includes:
Personnel's sensing step detects the position of each personnel by the way that infrared sensor indoors is arranged;
Personal identification step acquires the facial image of each personnel, and carries out recognition of face successively.
It is combined with recognition of face by infrared sensor, can comprehensively detect indoor personnel's situation.
The facial image of the personnel can be also shot in certification reminder step when unverified personnel are marked as certification personnel, Include the facial image of the personnel in certification reminder.Whether it is friend or relatives that user is facilitated to be differentiated by facial image.
The reaction of unverified personnel includes following there are lamp regulating step, indicator light regulating step is also executed instruction after exception Step:
Step 1:The position for tracking unverified personnel, judges whether unverified personnel flee from interior, if when, under executing One step, if it is not, then termination instruction lamp regulating step;
Step 2:The brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, navigation refers to Show that the navigation terminal of lamp is preset room security.
In the present embodiment technical solution, simulation playing module plays after detecting interior there are unverified personnel Preset scenario simulation sound, then scenario simulation sound indoor someone can be pretended when owner is not in, then into unverified Personnel play the role of certain fright, while if this unverified personnel is robber or feels undesirable people, he It will produce certain feared state of mind after hearing scenario simulation sound, and then have some abnormal behavior reactions;For example, robber Can direction movement rapidly be escaped to door and window etc. immediately after hearing the sound that key opens the door suddenly, it is quick to the direction far from doorway Escape, or quickly go in cabinet, the region that bed bottom etc. can hide is hidden;And personnel's analysis module, then it is directed to not The behavior reaction of certification personnel is analyzed, and then judges whether unverified personnel are robbers, and is sent in time to user equipment Alarm and reminding.In technical solution of the present invention, the identity of personnel judged to the reaction of scenario simulation sound by personnel, when there is friend When friend is visiting, typing user identity need not be shifted to an earlier date, simple and convenient, recognition accuracy is high, rate of false alarm is low, may be implemented indoor real When monitor, avoid unauthorized person from getting in, ensure indoor financial security.
Mobile behavior of the unverified personnel after hearing scenario simulation sound is analyzed first, then from moving direction, movement Three aspects of speed and dwell regions may determine that whether the behavior of unverified personnel is abnormal.Individual direction is abnormal or fast Degree is abnormal to be not enough to illustrate quickly to run to open the door after the behavior of unverified personnel hears enabling sound in the presence of exception, such as personnel, this When its speed be abnormal, but it is normal when behavior;Or personnel listen natively towards the direction movement opposite with sound source To after scene simulated sound, still moved away from the direction of sound, its behavior at this time is also normal, only when personnel listen To after scene simulated sound, movement speed becomes faster suddenly, and when moving direction is unreasonable, that is, behavior of provable the people person exists It is abnormal, therefore can be more accurately to the abnormal behavior of personnel by direction anomaly analysis unit and velocity anomaly analytic unit Whether judged.It is likely to one place of selection after the personnel such as robber hear sound to keep close, in the present solution, user can With the region of hiding in some houses of preset in advance, after unverified personnel hear sound, region of going to hide is gone to stop, then It can illustrate that the people person's reflex action is abnormal, there are problems.
Indicator light adjustment module connects the indicator lamp control system of entire building, and indicator light adjustment module is for detecting not After certification personnel flee from interior, the brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, is led The navigation terminal of boat indicator light is preset room security.By reducing the brightness of the emergency exit indicating lamp in corridor and opening pre- If navigation indicator light so that navigation indicator light is more obvious, and then can attract the attention of the unverified personnel to escape, into And will likely unverified personnel of problems guide to room security.
The above are merely the embodiment of the present invention, the common sense such as well known concrete structure and characteristic are not made excessively herein in scheme Description, all common of technical field that the present invention belongs to before one skilled in the art know the applying date or priority date Technological know-how can know the prior art all in the field, and with using routine experiment means before the date Ability, one skilled in the art can improve in conjunction with self-ability under the enlightenment that the application provides and implement we Case, some typical known features or known method should not become the barrier that one skilled in the art implement the application Hinder.It should be pointed out that for those skilled in the art, without departing from the structure of the invention, if can also make Dry modification and improvement, these should also be considered as protection scope of the present invention, these all do not interfere with the effect that the present invention is implemented and Patent practicability.The scope of protection required by this application should be based on the content of the claims, the specific reality in specification Apply the content that the records such as mode can be used for explaining claim.

Claims (9)

1. the security-protecting and monitoring method based on Internet of Things, it is characterised in that:Include the following steps:
Personnel's detecting step detects position and the identity of indoor occupant, judges whether not verified unverified of identity Personnel, if so, executing simulation plays step, if it is not, then repeating personnel's detecting step;
Simulation plays step, plays preset scenario simulation sound;
Personnel's analytical procedure analyzes unverified personnel and hears the behavior reaction after scenario simulation sound, judges unverified personnel's Whether reaction is abnormal, if so, executing alarm and reminding step;
Alarm and reminding step sends alarm and reminding to preset user equipment.
2. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:If in personnel's analytical procedure The reaction of unverified personnel is detected there is no abnormal, then the personnel are labeled as certification personnel, and to preset user equipment Send certification reminder.
3. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:Personnel's analytical procedure Including:
Mobile analytical procedure, according to the change in location of unverified personnel, analyze moving direction, the movement speed of unverified personnel with And dwell regions;
Anomaly analysis step, according to the play position of scenario simulation sound and broadcasting content and the mobile side of unverified personnel To, movement speed and dwell regions, judge whether the behavior of unverified personnel is normal.
4. the security-protecting and monitoring method according to claim 3 based on Internet of Things, it is characterised in that:The anomaly analysis step Including:
Direction anomaly analysis step, judge unverified personnel whether be directed away from the play position of scenario simulation sound direction, It leaves indoor direction or is moved to the direction in preset region of hiding, if so, velocity anomaly analytical procedure is executed, If it is not, then executing region anomaly analysis step;
Velocity anomaly analytical procedure judges whether the movement speed of unverified personnel is more than preset value, if so, judgement is unverified Staff response is abnormal, terminates anomaly analysis step, if it is not, then executing region anomaly analysis step;
Region anomaly analysis step, judge the position of unverified personnel whether eventually settle at it is preset hide in region, if so, Then judge that unverified staff response is abnormal.
5. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:Personnel's detecting step Including:
Personnel's sensing step detects the position of each personnel by the way that infrared sensor indoors is arranged;
Personal identification step acquires the facial image of each personnel, and carries out recognition of face successively.
6. the security-protecting and monitoring method according to claim 5 based on Internet of Things, it is characterised in that:By unverified worker labels Also to shoot the facial image of the personnel when certification personnel, the facial image of the personnel is included in the certification reminder.
7. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:The scenario simulation sound Including enabling sound, bath sound, cooking sound, dialogue sound and sound of snoring, play position and its content of the scenario simulation sound It is corresponding.
8. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:The simulation plays step In, the broadcasting of scenario simulation sound uses voice directional spreading technology so that unverified personnel can hear scenario simulation sound.
9. the security-protecting and monitoring method according to claim 1 based on Internet of Things, it is characterised in that:The reaction of unverified personnel There are lamp regulating step is also executed instruction after exception, the indicator light regulating step includes the following steps:
Step 1:The position for tracking unverified personnel, judges whether unverified personnel flee from interior, if when, next step is executed, If it is not, then termination instruction lamp regulating step;
Step 2:The brightness of emergency exit indicating lamp in corridor is reduced, while opening preset navigation indicator light, navigate indicator light Navigation terminal be preset room security.
CN201810701562.7A 2018-06-29 2018-06-29 Security monitoring method based on Internet of things Active CN108806155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810701562.7A CN108806155B (en) 2018-06-29 2018-06-29 Security monitoring method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810701562.7A CN108806155B (en) 2018-06-29 2018-06-29 Security monitoring method based on Internet of things

Publications (2)

Publication Number Publication Date
CN108806155A true CN108806155A (en) 2018-11-13
CN108806155B CN108806155B (en) 2020-02-11

Family

ID=64073518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810701562.7A Active CN108806155B (en) 2018-06-29 2018-06-29 Security monitoring method based on Internet of things

Country Status (1)

Country Link
CN (1) CN108806155B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815820A (en) * 2018-12-26 2019-05-28 深圳市天彦通信股份有限公司 Object localization method and relevant apparatus
CN110992626A (en) * 2019-11-26 2020-04-10 宁波奥克斯电气股份有限公司 Security method based on air conditioner and security air conditioner
CN114078301A (en) * 2020-08-17 2022-02-22 漳州立达信光电子科技有限公司 Security system, security protection method, security protection device and electronic equipment

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0919050B1 (en) * 1996-08-06 2000-03-22 Meto International GmbH Electronic anti-theft element
CN202584333U (en) * 2012-05-10 2012-12-05 何海参 Infrared monitoring antitheft alarm device
CN202666216U (en) * 2012-04-26 2013-01-16 浙江省江山市浙安消防设备有限公司 Multifunctional fire-fighting early-warning emergency escape and antitheft monitoring device
CN203102472U (en) * 2012-06-28 2013-07-31 潍坊新控机电科技有限公司 Base station room alarm and monitoring device
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
CN203812304U (en) * 2014-05-10 2014-09-03 中煤科工集团淮北爆破技术研究院有限公司 Personal quota monitoring system of entrance guard for manufacturing enterprise of civilian blasting material
US20150077555A1 (en) * 2013-07-26 2015-03-19 Joseph Frank Scalisi Light socket cameras
CN205230242U (en) * 2015-12-04 2016-05-11 重庆财信合同能源管理有限公司 Intelligent residential district security protection system
CN105741458A (en) * 2014-12-08 2016-07-06 西安扩力机电科技有限公司 Antitheft alarm device for school computer machine room
KR20170101643A (en) * 2016-02-29 2017-09-06 권장한 Anti-theft system and method
CN107393246A (en) * 2017-08-12 2017-11-24 宋彦震 Internet of things intelligent household monitoring system
CN206907173U (en) * 2017-04-19 2018-01-19 重庆工程职业技术学院 Automatic burglar alarm device based on poultry
CN107958562A (en) * 2016-10-14 2018-04-24 浩思八方科技(北京)有限公司 A kind of household safe Active Defending System Against and method

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0919050B1 (en) * 1996-08-06 2000-03-22 Meto International GmbH Electronic anti-theft element
CN202666216U (en) * 2012-04-26 2013-01-16 浙江省江山市浙安消防设备有限公司 Multifunctional fire-fighting early-warning emergency escape and antitheft monitoring device
CN202584333U (en) * 2012-05-10 2012-12-05 何海参 Infrared monitoring antitheft alarm device
CN203102472U (en) * 2012-06-28 2013-07-31 潍坊新控机电科技有限公司 Base station room alarm and monitoring device
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
US20150077555A1 (en) * 2013-07-26 2015-03-19 Joseph Frank Scalisi Light socket cameras
CN203812304U (en) * 2014-05-10 2014-09-03 中煤科工集团淮北爆破技术研究院有限公司 Personal quota monitoring system of entrance guard for manufacturing enterprise of civilian blasting material
CN105741458A (en) * 2014-12-08 2016-07-06 西安扩力机电科技有限公司 Antitheft alarm device for school computer machine room
CN205230242U (en) * 2015-12-04 2016-05-11 重庆财信合同能源管理有限公司 Intelligent residential district security protection system
KR20170101643A (en) * 2016-02-29 2017-09-06 권장한 Anti-theft system and method
CN107958562A (en) * 2016-10-14 2018-04-24 浩思八方科技(北京)有限公司 A kind of household safe Active Defending System Against and method
CN206907173U (en) * 2017-04-19 2018-01-19 重庆工程职业技术学院 Automatic burglar alarm device based on poultry
CN107393246A (en) * 2017-08-12 2017-11-24 宋彦震 Internet of things intelligent household monitoring system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
LINDA LITTLE: "Private whispers/public eyes:Is receiving highly personal information in a public place stressful?", 《INTERACTING WITH COMPUTERS》 *
任昊: "面向入室盗窃的家庭防盗设施设计", 《中国优秀硕士学位论文全文数据库工程科技Ⅱ辑》 *
卢俊生: "犯罪体态语探微", 《公安大学学报》 *
李昊原: "犯罪嫌疑人虚假供述的肢体语言研究", 《中国优秀硕士学位论文全文数据库社会科学Ⅰ辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815820A (en) * 2018-12-26 2019-05-28 深圳市天彦通信股份有限公司 Object localization method and relevant apparatus
CN110992626A (en) * 2019-11-26 2020-04-10 宁波奥克斯电气股份有限公司 Security method based on air conditioner and security air conditioner
CN114078301A (en) * 2020-08-17 2022-02-22 漳州立达信光电子科技有限公司 Security system, security protection method, security protection device and electronic equipment

Also Published As

Publication number Publication date
CN108806155B (en) 2020-02-11

Similar Documents

Publication Publication Date Title
EP3012813B1 (en) Event detection system
CN108806155A (en) Security-protecting and monitoring method based on Internet of Things
CN109413369A (en) A kind of monitor video intellectual analysis early warning platform
WO2017080434A1 (en) Intelligent building monitoring method based on face recognition
CN108922101B (en) A kind of several Hisense's breath intelligent security guard Campus Management Systems
CN108898717A (en) A kind of intelligent safety defense monitoring system
US20060225352A1 (en) Method and device for pass-through control and/or singling-out of persons
CN105488888A (en) Intelligent entrance guard system
CN117371872A (en) Intelligent management method and platform for intelligent building
US11164414B2 (en) System and method for providing secure access
CN114566023A (en) Emergency alarm system for school
KR20140122616A (en) Access Control system and method
KR101262363B1 (en) Entrance control system
JP2011227679A (en) Notification device
CN111666780A (en) Intelligent door control security method based on emotion recognition technology
JP2019212020A (en) Evacuation guide server, evacuation guide system and evacuation guide method
CN109920112A (en) A kind of Development of intelligent laboratory
CN212933288U (en) Safety control platform system for intelligent elevator
JP4220322B2 (en) Intruder monitoring method and apparatus
CN208506834U (en) A kind of building security system
CN109785567B (en) Centralized prompting device for fireproof door and fireproof door system
JP2011227675A (en) Notification device
CN110895686A (en) On-duty identification method for special person of fire-fighting person
US20240161590A1 (en) Light switch systems configured to respond to gunfire and methods of use
CN112000021A (en) Household intelligent household control method based on new generation information technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant