CN108961632A - alarm method and device - Google Patents

alarm method and device Download PDF

Info

Publication number
CN108961632A
CN108961632A CN201810946398.6A CN201810946398A CN108961632A CN 108961632 A CN108961632 A CN 108961632A CN 201810946398 A CN201810946398 A CN 201810946398A CN 108961632 A CN108961632 A CN 108961632A
Authority
CN
China
Prior art keywords
room
personnel
guard space
alarm
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810946398.6A
Other languages
Chinese (zh)
Inventor
张跃进
曾庆生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongxiang Bo Qian Mdt Infotech Ltd
Original Assignee
Zhongxiang Bo Qian Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongxiang Bo Qian Mdt Infotech Ltd filed Critical Zhongxiang Bo Qian Mdt Infotech Ltd
Priority to CN201810946398.6A priority Critical patent/CN108961632A/en
Publication of CN108961632A publication Critical patent/CN108961632A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/181Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention relates to a kind of alarm method and devices, this programme is to determine in room under unmanned state, if detecting the object into guard space, judge whether object is unauthorized persons, if object is unauthorized persons, alarm command is assigned, and executes the corresponding operation of alarm command, to monitor terminal dialing alarm.There is robber to swarm into so as to quickly remind in user family, assists user to catch robber, guarantee the security of the lives and property of people.

Description

Alarm method and device
Technical field
The present invention relates to technical field of burglary prevention, and in particular to a kind of alarm method and device.
Background technique
With the development of economy, people's lives level is gradually increased, and the items placed at home are more and more, has Many criminals attempt burglary.In order to cope with burglary, it seems burglary-resisting window, anti-that people, which start to install anti-theft device, Net etc. is stolen, but these anti-theft devices do not play due anti-theft function, and it is hidden to cause safety to a certain extent instead Suffer from, and existing burglar alarm is mostly based on the type of alarm of GSM SMS module, although type of alarm is not concealed straight It connects.Due to lacking effective burglary warning device, the security of the lives and property of people has been threatened.
Summary of the invention
In view of this, the present invention provides a kind of alarm method and device, guarantee the security of the lives and property of people.
In order to achieve the above object, the present invention adopts the following technical scheme:
A kind of alarm method, comprising:
It is determining in room under the unmanned state, if detecting the object into guard space, is judging that the object is No is unauthorized persons;
If the object is unauthorized persons, alarm command is assigned;
Execute the corresponding operation of the alarm command, and to monitor terminal dialing alarm.
Further, in the determining room under unmanned state, comprising:
The personnel of determination are into room or to walk out room, when described into room and the personnel amount for walking out room When equal, judge in room in unmanned state.
Further, the determining personnel are into room or to walk out room, comprising:
If someone passes through guard space, side of the guard space far from room detects personnel prior to the side close to room Multidate information, then judge that personnel enter room;
If someone passes through guard space, guard space detects personnel prior to the side far from room close to the side in room Multidate information, then judge that personnel withdraw from a room.
It is further, described to judge whether the object is authorized person, comprising:
The information of authorized person is obtained in advance:
If detecting, the information into the personnel of the guard space is not inconsistent with the authorized person's information obtained in advance, Judge the personnel into guard space for unauthorized persons.
It is further, described to monitor terminal dialing alarm, comprising:
Dial feature based on idle terminal, to the monitor terminal dialing alarm.
Further, described to execute the corresponding operation of the alarm command, and to after monitor terminal dialing alarm, also wrap It includes:
It continues to test and stops by the disengaging information of guard space personnel when being again at unmanned state in the room Only alarm.
A kind of warning device, including,
Judgment module, if detecting the object into guard space, is sentenced for determining in room under the unmanned state Whether the object that breaks is unauthorized persons;
Control module assigns alarm command if being unauthorized persons for the object;
Execution module, for executing the corresponding operation of the alarm command, and to monitor terminal dialing alarm.
Further, the judgment module is specifically used for:
If someone passes through guard space, guard space detects personnel's prior to the side close to room far from room side Multidate information then judges that personnel enter room;
If someone passes through guard space, guard space detects personnel's prior to the side far from room close to room side Multidate information then judges that personnel withdraw from a room;
When described equal with the number for walking out room into room, judge in room in unmanned state.
Further, the judgment module is also used to:
The information of the authorized person is obtained in advance;
Detect that the information into the object of the guard space is not inconsistent with the authorized person's information obtained in advance, then sentences The object into guard space that breaks is unauthorized persons.
Further, the execution module is specifically used for:
Dial feature based on idle terminal, to the monitor terminal dialing alarm.
The present invention provides a kind of alarm method and device.Using above technical scheme, the anti-theft device can obtain warp The disengaging information of guard space personnel is crossed, then counts the quantity by guard space personnel, the number in calculated room, when When accumulated number is 0 in the room, if there are unauthorized persons to enter room, alarm command is assigned, executes the alarm command pair The operation answered, and control old mobile phone alarm.There is robber to swarm into so as to quickly remind in user family, user is assisted to catch robber Thief guarantees the security of the lives and property of people.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the flow chart of alarm method embodiment one of the invention.
Fig. 2 is the flow chart of alarm method embodiment two of the invention.
Fig. 3 is the structural schematic diagram of warning device of the invention.
Fig. 4 is the structural schematic diagram of warning device of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, technical solution of the present invention will be carried out below Detailed description.Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, those of ordinary skill in the art are obtained all without making creative work Other embodiment belongs to the range that the present invention is protected.
Embodiment one:
Referring to Fig. 1, Fig. 1 is the flow chart of alarm method embodiment one of the invention, as shown in Figure 1, the present embodiment Alarm method may comprise steps of:
S101, it is determining in room under the unmanned state, if detecting the object into guard space, is judging that object is No is unauthorized persons.
Specifically, after burglary-resisting installation is powered, anti-theft device is started to work.When someone passes through guard space, if warning is empty Between far from room side detect the multidate information of personnel prior to the side close to room, then may determine that personnel enter room at this time Between, and the quantity into room personnel can be counted simultaneously;When someone passes through guard space, if guard space is close to room Side detects the multidate information of personnel prior to the side far from room, then may determine that personnel withdraw from a room at this time, and can To count the quantity for the personnel that withdraw from a room simultaneously.It, can be with when the number for entering room is equal with the personnel amount to withdraw from a room Judge to be in unmanned state in room at this time.
In the present embodiment, the information of authorized person can be obtained in advance.Specifically, the head portrait of acquisition authorized person can be preselected Information, finger print information, palm print information etc. can identify the information of personal identification.It is determining in room under unmanned state, if Someone enters guard space, then needs to judge the identity information of this person, can be with the information of the authorized person obtained in advance Comparison, judges whether this person is authorized person, if the information into room personnel is not inconsistent with the authorized person's information obtained in advance, It is judged as unauthorized persons.
For how to monitor the movement of object in space, be mostly now using ultrasonic wave, microwave and infrared mode come It realizes, since the price of ultrasonic sensor is more expensive, and the common detectable range of microwave only has 2-3 meters, search angle Degree is also corresponding smaller, it is preferable that can design alarm using infra-red detection.Infrared acquisition dress currently on the market Set be divided into it is active and two kinds of passive type.Active infrared detection device is that detector actively issues infrared ray, if on way In encounter object and will generate reflection, reflected infrared ray is received by the probe of detector again.If probe monitors are to instead The infrared ray penetrated is stationary, that is, constantly issues what infrared ray constantly reflected again, then there will be no different for detector Regular signal.When there is mobile object to block this infrared ray invisible to the human eye, probe will detect abnormal signal. The infrared detection device of passive type has just lacked a function in contrast, exactly emits infrared ray.In physics, when object When temperature is higher than absolute zero, infrared ray will be launched outward automatically, and exactly any temperature is greater than absolute zero in a word Object can launch outward infrared ray automatically.And principle later, passive type infrared detection device with it is active be as. Infrared detection device is very sensitive to temperature, because the infra-red intensity that the higher object of temperature gives off outward is higher, When passive type infrared detection device detects the infrared radiation for having intensity to be higher than under normal circumstances in space, will issue different Regular signal.Due to passive type infrared detection device in sensitivity not as good as active infrared detection device, it is preferable that It can choose active infrared detection device.
Preferably, active infrared detection device used by the present embodiment is made of transmission, reception device two parts. Infrared sending device sends a branch of infrared-ray to nigh infrared receiving device is filled, and when infrared-ray is interdicted, receives Device issues abnormal signal immediately, so active infrared detection device is also blocking type detector, can also be referred to as to penetrating Formula detector.
When infrared transmitting portion is under different transmission states, correspondingly there is different output states in receiving end.It connects The output state of receiving end is broadly divided into five kinds of self-locking, interlocking, pulse, level, data forms, it is preferable that can be using " self-locking " form, " self-locking " output refer to that receiving end will correspond to output end and change once whenever transmitting terminal presses some key State was that low level becomes high level, and was originally that high level becomes low level originally.Such output is suitable as power supply and opens Pass, mute control etc., this output form can also be referred to as to be " reverse phase " form.
Infrared detection circuit can be made of two infrared light-emitting diodes and two infrared receiving diodes, can be two-by-two It is mating, one in front and one in back side by side arrangement, and then judge it is " into " or " out " on earth when personnel pass through, while can be infrared to every set R-T unit adds a light emitting diode to indicate whether the infrared transceiver device is excited, light-emitting diodes when someone passes through Pipe will flash once, and representative has personnel to pass through this set infrared transceiver device.
Ground level is between 10cm to 20cm in foot when showing that general normal adult is walked according to result of study, body Height is between 150cm to 180cm, and if a normal person is by room door, the region between 20cm to 150cm is certain It can be passed through by human body, it is possible to which the region between 20cm to 150cm is classified as to the bound of measurement height in measurement.Due to The standard door opening of general entering house door is having a size of 95cm × 205cm × 9cm or 95cm × 205cm × 22cm, so two pairs of infrared receipts The placement interval of transmitting apparatus;It is preferred that between 9cm to 22cm.For the installation position of infrared sending device and infrared receiving device It sets, it, may on door if one end of infrared facility to be mounted in because present security door is mostly single open-type So that infrared sending device can not accurately dock infrared receiving device, while may also can close the door because of opening the door on door It shakes and is damaged, it is advantageous to the right and lefts that infrared sending device is mounted on doorframe with infrared receiving device to survey Amount.
, can be primary every 20cm test from 30cm to 150cm in height after infrared transceiver device is installed, due to red The interval of outer transmitting terminal is immutable, then can survey between 2cm to 22cm every 4cm from the interval of two infrared receiving devices Examination is primary, because it is all 95cm that major part in the market, which singly opens the width of security door, it is preferable that the infrared transmission of the present embodiment fills It sets and is also disposed at 95cm at a distance from infrared receiving device.The result that can final test alarm is as follows:
The test result when adult of height 175cm passes through doorway
The test result when adult of height 160cm passes through doorway
The test result when children of height 125cm pass through doorway
Height is test result when the pet dog of 25cm passes through doorway
Measurement result shows to find only to work as have object to pass through area between infrared light-emitting diode and infrared receiving diode The reason of domain will trigger alarm, be far below normal adult due to the height of children, allowed also for pet, and it is normal People's both legs when on foot are one in front and one in back alternately to step forward, in order not to allow infrared facility that one people is identified as two people, institute Liftoff 50cm to 110cm height can be mounted according to measurement data burglar alarm, it is preferable that the present embodiment mounting height In 80cm or so.Because the width of the doorframe of present most of single open-doors is mostly in 10cm or so, two infrared receiver dresses The installation interval set can be within 10cm, it is preferable that the present embodiment installation interval is 5cm or so.
If into the object of guard space being S102, unauthorized persons, alarm command is assigned.
The information for entering room personnel is received, if the personnel into room are unauthorized persons, assigns alarm command.
S103, the corresponding operation of alarm command is executed, and to monitor terminal dialing alarm.
After receiving alarm command, idle terminal can be alarmed by dial feature to monitor terminal.User can appoint The number of meaning setting monitor terminal, can set monitor terminal to user oneself, number of cell security personnel etc..
Idle terminal can be used old mobile phone and realize.Waste mobile phone just belongs to electronic waste not obtaining recycling, It is very big to environmental hazard if electronic waste is dealt with improperly.Be in old mobile phone is idle, also there are many security risk, because of hand The lithium battery of machine has the service life, places the danger that may corrode very much furniture long or even have generation fire.Many people can select handle The old mobile phone to get off is eliminated to sell after carrying out factory reset.But many old mobile phones can factory reset Personal information is restored, if these information are obtained by criminal, consequence will be hardly imaginable.So the spare time of old mobile phone The not still waste of resource is set, our personal safety as well as the property safety can be also endangered.
Meanwhile old mobile phone is not to be really good for nothing, many old mobile phones be not because be not available and by washing in a pan It eliminates, they are for no other reason than that function is out of step with the times and is eliminated.These mobile phones still have many functions, for example photograph is taken the photograph As, make a phone call, send short messages etc., can use these functions of old mobile phone to provide convenience for life.Old mobile phone is being become useless When for treasured, these functions of old mobile phone can be made full use of.The best way is re-using that old mobile phone is turned waste into wealth, and is used Old mobile phone makes household safety alarming devices, not only can load onto a umbrella for household safe, and can make to have eliminated Old mobile phone is recycled, and is polluted caused by environment, water source, atmosphere so as to avoid random discarding, but also being stored in Personal information in old mobile phone will not be learnt by stranger.Old mobile phone is communicated using most mature GSM network, it can To be transmitted on mobile phone the information of alarm with most intuitive phone dialing mode, more directly, faster, and it is not easy maliciously to be cut It is disconnected.
Preferably, the present embodiment selects Nokia E72 as idle terminal, can by power button and 3 number keyboards come Mobile phone is controlled, when the power is turned on, power button is activated, mobile phone power-on, when there is alarm command to pass over, 3 number keyboards It is activated, 3 number key of long-pressing dials preset number and warns.
Just mobile phone is set to be in standby interface by power button next time every one section of interval when specifically, in the standby state. When there is alarm command to be treated, can be powered simultaneously timing to dial-up circuit, it is preferable that when energization reaches 5 seconds or more When can be only achieved the purposes of No. 3 key one touch dials of long-pressing, in dialing procedure, can set after dialing time reaches 20 seconds from Dynamic to hang up, and return to standby interface, if unauthorized persons are always in doors, dialing, which will recycle always, to continue.
Specifically, the photo that idle terminal shooting unauthorized persons can be used other than dialing alarm or typing are not The video of authorized person, is sent to monitor terminal together.In addition, in order to alert unauthorized persons warning can also be entered in unauthorized Alarm is made a sound when space, or plays one section of good voice of prior typing automatically, and unauthorized persons is allowed to take for someone in family, To draw back intruder with fear.Preferably, buzzer can be used to alarm, and the power drive pipe S8550 of positive-negative-positive can be used To drive buzzer.
Old mobile phone is used to alarm as idle terminal if should be noted that, but the power supply of old mobile phone may not have long very much With cause without with, and the old mobile phone for having used long power supply radiation it is larger, it is possible to using USB interface give old mobile phone and circuit It powers together, does not need to separate the power supply of cellular phone power supplies and alarm system.
Anti-theft device can obtain the disengaging information by guard space personnel, then count described and pass through guard space personnel Quantity, the number in calculated room, if there is unauthorized persons to enter room, assigns report when accumulated number is 0 in the room Alert order, executes the corresponding operation of the alarm command, and control old mobile phone alarm.Have so as to quickly remind in user family Robber swarms into, and assists user to catch robber, guarantees the security of the lives and property of people.
Embodiment two:
S201, it is determining in room under the unmanned state, if detecting the object into guard space, is judging that object is No is unauthorized persons.
Specifically, it is determining in room under the unmanned state, if detecting the object into guard space, is judging object It whether is that detailed explanation has been carried out in unauthorized persons in S101, which is not described herein again.
If S202, object are unauthorized persons, alarm command is assigned.
Specifically, it if object is unauthorized persons, assigns alarm command and detailed explanation has been carried out in S102, here It repeats no more.
S203, the corresponding operation of alarm command is executed, and to monitor terminal dialing alarm.
Specifically, the corresponding operation of alarm command is executed, and has been carried out in S103 to monitor terminal dialing alarm Detailed explanation, details are not described herein again.
In addition, in addition to use seem old non-smart mobile phone Nokia E72 in S103 as idle terminal alarm other than, also Old smart phone can be used to alarm as idle terminal, a dialing APP can be installed on smart phone, which can It receives the alarm command that control system is passed over by mobile phone charging interface and completes dialing alarm, the benefit designed in this way is just It is the one touch dial function of not needing using mobile phone, but handset dialing is directly controlled by APP, it cannot without some number key Other more functions can also be arranged in defect, APP dialing, for example can receive the feedback information of user and make corresponding Operation, user can remotely be controlled the behavior of burglar alarm by APP, APP can further be made to obtain taking the photograph for mobile phone As permission, takes the photo of intruder or video and be transmitted to householder.
S204, continue to obtain the disengaging information for passing through guard space personnel, when being in unmanned state again in room, stop Alarm.
After unauthorized persons enter room, while alarm, it can continue to obtain the disengaging for passing through guard space personnel Information, if someone passes through guard space, guard space detects personnel's prior to the side far from room close to room side Multidate information then judges that unauthorized persons withdraw from a room.When being in unmanned state again in room, that is, unauthorized persons leave room Between after, assign stop alarm order, cancellation alarm keys can also can be set with stop alarm at this time, when press cancel alarm It, also can stop alarm when key.
Anti-theft device can obtain the disengaging information by guard space personnel, then count described and pass through guard space personnel Quantity, the number in calculated room, if there is unauthorized persons to enter room, assigns report when accumulated number is 0 in the room Alert order, executes the corresponding operation of the alarm command, and control old mobile phone alarm.When unauthorized persons withdraw from a room, stop report It is alert.There is robber to swarm into so as to quickly remind in user family, user is assisted to catch robber, guarantees the lives and properties peace of people Entirely.
Embodiment three:
Fig. 3 is the structural schematic diagram of warning device of the invention.As shown in figure 3, warning device includes judgment module 11, control Molding block 12 and execution module 13.
Judgment module 11, for determining in room under unmanned state, if detecting the object into guard space, Judge whether the object is unauthorized persons;
In the present embodiment, judgment module 11 is specifically used for:
If someone passes through guard space, guard space detects personnel's prior to the side close to room far from room side Multidate information then judges that personnel enter room;
If someone passes through guard space, guard space detects personnel's prior to the side far from room close to room side Multidate information then judges that personnel withdraw from a room.
Judgment module 11 is also used to:
The information of the authorized person is obtained in advance;
Detect that the information into the object of the guard space is not inconsistent with the authorized person's information obtained in advance, then sentences The object into guard space that breaks is unauthorized persons.
Control module 12 assigns alarm command if being unauthorized persons for the object;
In the present embodiment, control module 12 is specifically used for:
The information for entering room personnel is received, if being unauthorized persons into room personnel, assigns alarm command.
Execution module 13, for executing the corresponding operation of the alarm command, and to monitor terminal dialing alarm.
In the present embodiment, execution module 13 is specifically used for:
Dial feature based on idle terminal, to the monitor terminal dialing alarm.
Further, on the basis of embodiment shown in Fig. 3, judgment module is also used to after unauthorized persons enter room, While alarm, continue to obtain the disengaging information for passing through guard space personnel.
In the present embodiment, judgment module 11 is specifically used for when unauthorized persons enter room after, can be with while alarming Continue to obtain the disengaging information for passing through guard space personnel, if someone passes through guard space, guard space is close to room side elder generation The multidate information of personnel is detected in the side far from room, then judges that unauthorized persons withdraw from a room.When in room and in nothing When people's state, unauthorized persons all withdraw from a room at this time for judgement.
Control module 12 is also used to after unauthorized persons all withdraw from a room, and assigns stop alarm order.
Execution module 13 is also used to execute the corresponding operation of stop alarm order, and stops to monitor terminal dialing alarm.
Fig. 4 is the structural schematic diagram of warning device of the present invention.As shown in figure 4, warning device includes: processor 21, and The memory 22 being connected with processor 21.
For memory 22 for storing computer program, computer program at least is used to execute the alarm side of above-described embodiment Method;
Processor 21 is for calling and executing the computer program in memory.
Specifically, in the present embodiment, processor 21 can select STC89C52 single chip.
It is understood that same or similar part can mutually refer in the various embodiments described above, in some embodiments Unspecified content may refer to the same or similar content in other embodiments.
It should be noted that in the description of the present invention, term " first ", " second " etc. are used for description purposes only, without It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present invention, unless otherwise indicated, the meaning of " multiple " Refer at least two.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of alarm method characterized by comprising
Determining in room under the unmanned state, if detecting the object into guard space, judge the object whether be Unauthorized persons;
If the object is unauthorized persons, alarm command is assigned;
Execute the corresponding operation of the alarm command, and to monitor terminal dialing alarm.
2. method according to claim 1, which is characterized in that in the determining room under unmanned state, comprising:
The personnel of determination are into room or to walk out room, when described equal with the personnel amount for walking out room into room When, judge in room in unmanned state.
3. method according to claim 2, which is characterized in that the determining personnel are into room or to walk out room, are wrapped It includes:
If someone passes through guard space, side of the guard space far from room detects that personnel's is dynamic prior to the side close to room State information then judges that personnel enter room;
If someone passes through guard space, guard space detects that personnel's is dynamic prior to the side far from room close to the side in room State information then judges that personnel withdraw from a room.
4. method according to claim 1, which is characterized in that described to judge whether the object is authorized person, comprising:
The information of authorized person is obtained in advance:
If detecting, the information into the personnel of the guard space is not inconsistent with the authorized person's information obtained in advance, judges The personnel into guard space are unauthorized persons.
5. method according to claim 1, which is characterized in that described to monitor terminal dialing alarm, comprising:
Dial feature based on idle terminal, to the monitor terminal dialing alarm.
6. -5 either method according to claim 1, which is characterized in that it is described to execute the corresponding operation of the alarm command, And to after monitor terminal dialing alarm, further includes:
The disengaging information by guard space personnel is continued to test, when being again at unmanned state in the room, stops report It is alert.
7. a kind of warning device characterized by comprising
Judgment module, if detecting the object into guard space, judges institute for determining in room under the unmanned state State whether object is unauthorized persons;
Control module assigns alarm command if being unauthorized persons for the object;
Execution module, for executing the corresponding operation of the alarm command, and to monitor terminal dialing alarm.
8. device according to claim 7, which is characterized in that the judgment module is specifically used for:
If someone passes through guard space, guard space detects the dynamic of personnel far from room side prior to the side close to room Information then judges that personnel enter room;
If someone passes through guard space, guard space detects the dynamic of personnel close to room side prior to the side far from room Information then judges that personnel withdraw from a room;
When described equal with the number for walking out room into room, judge in room in unmanned state.
9. device according to claim 7, which is characterized in that the judgment module is also used to:
The information of the authorized person is obtained in advance;
Detect that the information into the object of the guard space is not inconsistent with the authorized person's information obtained in advance, then judges institute State into guard space object be unauthorized persons.
10. device according to claim 7, which is characterized in that the execution module is specifically used for:
Dial feature based on idle terminal, to the monitor terminal dialing alarm.
CN201810946398.6A 2018-08-20 2018-08-20 alarm method and device Withdrawn CN108961632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810946398.6A CN108961632A (en) 2018-08-20 2018-08-20 alarm method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810946398.6A CN108961632A (en) 2018-08-20 2018-08-20 alarm method and device

Publications (1)

Publication Number Publication Date
CN108961632A true CN108961632A (en) 2018-12-07

Family

ID=64470807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810946398.6A Withdrawn CN108961632A (en) 2018-08-20 2018-08-20 alarm method and device

Country Status (1)

Country Link
CN (1) CN108961632A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706438A (en) * 2019-09-27 2020-01-17 空山科技有限公司 Security early warning system and method based on intelligent drinking equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105469472A (en) * 2014-08-25 2016-04-06 珠海格力电器股份有限公司 Intelligent access control method and system
CN106247558A (en) * 2016-08-25 2016-12-21 珠海格力电器股份有限公司 The control method of air-conditioner and device
CN106296916A (en) * 2016-08-08 2017-01-04 京东方科技集团股份有限公司 A kind of Door-access control method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105469472A (en) * 2014-08-25 2016-04-06 珠海格力电器股份有限公司 Intelligent access control method and system
CN106296916A (en) * 2016-08-08 2017-01-04 京东方科技集团股份有限公司 A kind of Door-access control method and device
CN106247558A (en) * 2016-08-25 2016-12-21 珠海格力电器股份有限公司 The control method of air-conditioner and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706438A (en) * 2019-09-27 2020-01-17 空山科技有限公司 Security early warning system and method based on intelligent drinking equipment

Similar Documents

Publication Publication Date Title
US10497230B2 (en) Smart barrier alarm device
US5428345A (en) Method of and apparatus for operating a security system to produce an alarm signal
US7859404B2 (en) Method and apparatus for proximity activated RFID system
US20150379795A1 (en) Active Detection Type Radio Frequency Identification Smart Door Lock Controller
US5019802A (en) Intrusion detection apparatus
US8427314B2 (en) Silent anti-theft protection system for goods presented to the public
CN103810806B (en) Dormitory security alarm device and dormitory security alarm system
CN111691764B (en) Household intelligent door lock and control method thereof
US11674841B2 (en) Connected scale device
NZ576187A (en) Disarming a security system based on a packet and detected motion
CA2729689C (en) Security system and method for using an lf activated rfid tag
CN108961632A (en) alarm method and device
CN107808488A (en) A kind of false alarm prevention home security monitoring system and monitoring control
CN107170191A (en) Protective alarming implementation method, device and protection alarm
Javare et al. Access control and intrusion detection in door lock system using Bluetooth technology
TWI642020B (en) Crowd control security system
Venkateshkumar et al. Farm intrusion detection system using iot
CN103778740B (en) A kind of balcony intelligent anti-theft alarming device and method
US7772984B2 (en) Remote control security supervisory control apparatus
CN103559764B (en) A kind of anti-interference communication device for security protection
Tasie et al. Design and Implementation of Intruder Detector System with SMS Alert
CN116343418B (en) Intelligent monitoring method, intelligent door lock and intelligent door
Abiodun et al. Development of an Intruder Detection with Alert System Using Wireless Technology
KR20140095350A (en) Apparatus and mehtod for protecting intrusion
JP5497513B2 (en) Object detection sensor and security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181207