CN109218669A - A kind of intelligent video monitoring linkage mobile phone detection alarm method - Google Patents

A kind of intelligent video monitoring linkage mobile phone detection alarm method Download PDF

Info

Publication number
CN109218669A
CN109218669A CN201811064955.8A CN201811064955A CN109218669A CN 109218669 A CN109218669 A CN 109218669A CN 201811064955 A CN201811064955 A CN 201811064955A CN 109218669 A CN109218669 A CN 109218669A
Authority
CN
China
Prior art keywords
alarm
mobile phone
cell
phone number
idx
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811064955.8A
Other languages
Chinese (zh)
Inventor
赵霞
冯泽骁
于重重
崔迎宝
赵松
李磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Technology and Business University
Original Assignee
Beijing Technology and Business University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Technology and Business University filed Critical Beijing Technology and Business University
Priority to CN201811064955.8A priority Critical patent/CN109218669A/en
Publication of CN109218669A publication Critical patent/CN109218669A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/907Television signal recording using static stores, e.g. storage tubes or semiconductor memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Abstract

The present invention proposes a kind of intelligent video monitoring linkage mobile phone detection alarm method, builds the system architecture constituted including web camera, network hard disk video recorder, Alarm Server, client, mobile phone detector;Mobile phone detector obtains mobile phone raw information, and characteristic extracting module extracts the characteristic information that mobile phone occurs, and alarm module judges and alarms according to alarm rule, and by live video stream and cellphone information synchronized push to client;Rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, is stored in alarm rule library.This method obtains cellphone information in real time and merges video alarm, intelligence generates alarm rule, intelligent video monitoring alarm system is set to have many advantages, such as that discovery in real time, information is accurate, video evidence is complete, intelligence discovery suspect, greatly improve the automation, intelligence, alarm accuracy of system, and the alert identification and capability of fast response of security department, there is good application value and economic benefit.

Description

A kind of intelligent video monitoring linkage mobile phone detection alarm method
Technical field
The present invention relates to video monitoring linkage mobile phone alarms, and in particular to a kind of intelligent video monitoring linkage mobile phone detection report Alarm method belongs to intelligent security guard field of video monitoring.
Background technique
In safe city monitoring project, high-definition video monitoring is all deployed in each key area, but most of videos are supervised Control no intellectual analysis and linkage mobile phone detector.Allow monitor video pictures, institute security protection staff's moment due to being difficult to It is mainly used for post-mordem forensics with video monitoring image.In some special cases, such as under the night scenes of College Dormitory, Criminal steals clothes in outdoor balcony, is often difficult to find in time.When Deng finding merit, the opportunity arrested has been had already passed by, But when next habitual offender commits a crime again, due to not timing and dark etc., the opportunity of arresting can be still missed, such case becomes very The thorny problem that more Security Departments of enterprises and institutions shop front is faced.Commonly used with mobile phone, many criminals are carry-on Carrying mobile phone improves the recognition capability to abnormal conditions and alert if intelligent video monitoring can be linked to mobile phone detection alarm, It can be at the time of committing a crime for the first time and place gets monitor video and mobile phone relevant information, when criminal occurs again and Times Police arrests, and meets the needs of security department's active, real time monitoring early warning.
Some video monitoring alarm methods or system are had already appeared at present, such as the Shenzhen river Fan Haisan electronics share has The video monitoring and firefighting warning linkage method and system (CN201610826003.X) of limit company design, the system pass through fire-fighting Alarm and the alarm joint alarm of video monitoring intellectual analysis, are mutually authenticated alert and audit, reduce rate of false alarm, it is quasi- to improve alarm Exactness.Linkage of the patent mainly for fire-fighting event and video.The prison of video disclosed in Shenzhen DSW Electronic Co., Ltd. It controls alarm system (CN201220259721.0), this system provides video monitorings and telephone phonic alarm function, are generating report Picture is captured when alert signal and recorded video is checked for user.People's incoming call telephone alarm is needed, system captures picture and video recording automatically. The video monitoring alarm method and system (CN201710087254.5) of upper SeaBird rice Science and Technology Ltd. design, utilize artificial intelligence Energy method, which refine to video, is converted into text, picture, voice, and user just can know that asking for alert content without look at video Topic, saves user time, improves information acquisition efficiency.
The present invention is directed to different alarm demands from the above patent, and function and effect be not also identical.The present invention by with hand Machine detector linkage, detect mobile phone signal automatically, and judge automatically according to alarm rule and whether need to alarm, by real-time video, The relevant informations such as cell-phone number, warning reason are sent to client, improve the recognition capability to alert;The invention patent can also root Alarm rule is generated according to the setting of administrator;Intellectual analysis is carried out to historical data, extracts suspicious cell-phone number occurrence law, from Movable property gives birth to alarm rule, greatly improves intelligence degree.Automation, the intelligence of existing video monitoring system can be effectively improved Change, alarm accuracy, timeliness etc. have very big application value and commercial value.
Summary of the invention
The present invention proposes a kind of intelligent video monitoring linkage mobile phone detection alarm method, and this method is built including network shooting The video monitoring linkage mobile phone detection alarm that machine, network hard disk video recorder, Alarm Server, client, mobile phone detector are constituted System architecture;Mobile phone detector obtains cellphone information and saves to database;Characteristic extracting module is extracted in raw data table Feature generates characteristic information table;Alarm module judges and alarms according to alarm rule existing in alarm rule library;It needs to alarm When, by the live video stream and cellphone information synchronized push that monitor the phone area to client;Rules customization module is based on intelligence It can analyze and user's interaction customization generates three classes alarm rule, deposit alarm rule library.Specifically, the method for the present invention includes The following steps:
A. video monitoring linkage mobile phone detecting and warning system framework is built, the specific steps are as follows:
A1. system architecture includes web camera, network hard disk video recorder, Alarm Server, client, mobile phone detection Device;
A2. mobile phone detector and N platform web camera are mating at one group, and N therein includes but is not limited to 1, specific steps It is as follows:
A2.1. web camera is placed in monitoring area, is mounted within K meters of mobile phone detector of effective range, Wherein K includes but is not limited to 15 meters;
A2.2. by every group of facility information, including but not limited to position ID, mobile phone detector ID and web camera channel ID, group ID, are stored in facility information table;
A3. video flowing is passed to network hard disk video recorder by web camera;
A4. network hard disk video recorder stores video flowing, and according to the request of Alarm Server, video flowing is forwarded to take to alarm Business device;
A5. Alarm Server is responsible for video flowing forwarding, cellphone information processing and alarm decision, warning message forwarding;
B. mobile phone detector obtains cellphone information and saves to database, the specific steps are as follows:
B1. mobile phone detector appears in the information of mobile phone in signal coverage areas every M seconds automatically scannings, is denoted as original letter Breath, including but not limited to current time CURt, cell-phone number ID, international mobile subscriber identity IMSI, international mobile device identification Code IMEI;The M includes but is not limited to 5;
B2. raw information is saved in raw data table by mobile phone detector;
C. characteristic extracting module reads raw data table, generates characteristic information table, the specific steps are as follows:
C1. characteristic extracting module read raw information every M seconds from raw data table, and deleted the data read;
C2. every raw information is traversed, the characteristic information FI of each cell-phone number ID, write-in or the existing feature letter of update are generated Breath table is denoted as IDx by taking one of cell-phone number ID as an example, the specific steps are as follows:
When the characteristic information FI includes but is not limited to cell-phone number ID, entry time INt, residence time piece Lt and leaves Between OUTt;
C2.1. whether there is the characteristic information FI of IDx in query characteristics information table;If so, then executing C2.2;If no Then execute C2.3;
C2.2. it updates the existing characteristic information of IDx or increases the characteristic information of new IDx, the specific steps are as follows:
C2.2.1. current time is greater than M apart from existing the last item FI entry time, indicates that IDx is again introduced into local area Domain, create a new FI record for the IDx: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;From ETAD expected time of arrival and departure is set to " CURt+Lt*M ";
C2.2.2. current time is equal to M apart from existing the last item FI entry time, indicates that IDx persistently resides in this Region, update existing FI record: entry time INt is constant;Residence time piece Lt adds 1;Time departure is updated to " CURt+Lt* M";
C2.3. there is no the record of IDx in characteristic information table, show that IDx enters region for the first time, create one newly for IDx FI record: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;Time departure is set to " CURt+Lt* M";
D. alarm module judges and alarms according to alarm rule existing in alarm rule library, the specific steps are as follows:
D1. according to characteristic information table, the following characteristics of each cell-phone number IDx are calculated, the specific steps are as follows:
D1.1. single of the cell-phone number IDx in monitoring region is resident duration Lt*M;Most short resident duration MinLt, most reside permanently Stay duration MaxLt;
D1.2. the frequency of occurrence AF of cell-phone number IDx is the record number of the corresponding FI of the same cell-phone number IDx;
D2. alarm decision is carried out according to the characteristic information FI of cell-phone number IDx, the specific steps are as follows:
D2.1. cell-phone number IDx is in blacklist, then alarms;
D2.2. the entry time of cell-phone number IDx, single be resident the features such as duration, frequency of occurrence be in time of fire alarming section or Reach alarm threshold value, then alarms;
It, will be synchronous with the live video stream and cellphone information of the web camera of group with mobile phone detector when E. needing to alarm It is pushed to client, the specific steps are as follows:
E1. alarm module finds the channel ID with group web camera according to mobile phone detector ID, hard to corresponding network Disk video recorder requests video flowing, sends it to client;
E2. alarm module will need the cellphone information alarmed to be sent to client, including but not limited to cell-phone number ID, mobile phone Entry time INt, mobile phone are resident duration, frequency of occurrence AF;
F. rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, is stored in alarm rule Library, the specific steps are as follows:
F1. the alarm rule based on blacklist is formulated by interactive interface, the specific steps are as follows:
F1.1. it allows user to input the cell-phone number ID for needing to alarm, cell-phone number ID is written in blacklist table:
F1.2. user is allowed to select in the cell-phone number ID monitored, blacklist is written in the cell-phone number ID that user is selected In table;
F2. the alarm rule based on feature is formulated by interactive interface, the specific steps are as follows:
F2.1. user query mobile phone entry time, single is allowed to be resident the features such as duration, frequency of occurrence;
F2.2. the time of fire alarming section of user setting mobile phone entry time is allowed;Single is resident duration corresponding to duration, the frequency With the alarm threshold value of number;
F3. based on historical data analysis as a result, automatically generating suspect's alarm rule, the specific steps are as follows:
F3.1. the regular feature that cell-phone number occurs in analysis of history data, automatically extracts suspect cell-phone number ID, is added Suspicion roster;
The regularity refers in the alarm rule for being not comprised in and being specified by user, but hides spy in the historical data Sign, including but not limited to: periodically occurring, frequently occur in short term;
F3.2. the relevance in analysis of history data between multiple cell-phone numbers automatically extracts suspect's cell-phone number, is added and dislikes Doubt roster;
The relevance repeatedly occurs simultaneously including but not limited to: 2 or more cell-phone numbers, multiple time of occurrence relies on, There is overlapping or dependence etc. with blacklist cell-phone number time of occurrence;
F4. alarm rule library is written into the alarm rule of above-mentioned generation.
Intelligent video monitoring proposed by the present invention links mobile phone detection alarm method, can obtain cellphone information and real in time When extract feature, alarmed according to the alarm rule customized in advance;The live video stream synchronous with mobile phone can also be synchronized and be pushed away Give client;Alarm rule can be automatically generated based on data analysis and user's interaction, so that intelligent monitoring and alarming system has Have the advantages that discovery in real time, information is accurate, video evidence is complete, intelligence discovery suspect, greatly improves automation, the intelligence of system Energyization, alarm accuracy and the identification of the alert of security department and capability of fast response, have good application value and warp Ji benefit.
Detailed description of the invention
A kind of Fig. 1: intelligent video monitoring linkage mobile phone detection alarm method flow chart;
Specific embodiment
With reference to the accompanying drawing, by illustrate certain colleges and universities' video monitoring system and mobile phone detection interlink warning method mistake Journey is described further the method for the present invention as embodiment.
Method flow diagram is as shown in Figure 1.The method of the present invention includes: 1) to build video monitoring linkage mobile phone detecting and warning system Framework;2) mobile phone detector obtains cellphone information and saves to database;3) characteristic extracting module reads raw data table, generates Characteristic information table;4) alarm module judges and alarms according to alarm rule existing in alarm rule library;It 5), will when needing to alarm The live video stream and cellphone information synchronized push for monitoring the phone area are to client;6) rules customization module is based on intelligence point Analysis and user's interaction customization generate three classes alarm rule, are stored in alarm rule library.Specific implementation step is as follows:
1. building video monitoring mobile phone interlink alarm system framework, the specific steps are as follows:
1.1. system architecture includes web camera, network hard disk video recorder, Alarm Server, client, mobile phone detection Device;
1.2. mobile phone detector and 1 web camera are mating at one group, the specific steps are as follows:
1.2.1. web camera is placed in monitoring area, is mounted in the range of 15 meters of mobile phone detector;
1.2.2. by position ID (west gate -1), mobile phone detector ID-501, web camera channel ID-101, equipment group ID-0001 is stored in facility information table;
1.3. video flowing is passed to network hard disk video recorder by web camera;
1.4. network hard disk video recorder stores video flowing, and according to the request of Alarm Server, forwards video flowing to alarm Server;
1.5. Alarm Server is responsible for video flowing forwarding, the processing of mobile phone detection information and alarm decision, warning message forwarding;
2. mobile phone detector obtains cellphone information and saves to database, the specific steps are as follows:
2.1 mobile phone detectors are respectively in 2018-09-01 23:00:00,2018-09-01 23:00:05,2018-09-01 Tri- moment of 23:00:10, automatically scanning appear in the information of mobile phone in overlay area;
Raw information is saved in raw data table by 2.2 mobile phone detectors, as shown in table 1, table 4, table 7;
3. characteristic extracting module reads raw data table in 2018-09-01 23:00:00, characteristic information table is generated, specifically Steps are as follows:
3.1. characteristic extracting module reads raw data table, and the data of acquisition are as shown in table 1, and deletes the number read According to;
1 2018-09-01 23:00:00 raw information table of table
3.2. there is no 18301139681 in characteristic extracting module query characteristics information table, 15910585772, A new FI record is respectively created for above three cell-phone number ID, as shown in table 2 in 18810951592 characteristic information FI;
Characteristic information FI when 2 2018-09-01 23:00:00 of table
Cell-phone number ID Entry time INt Time departure OUTt Residence time piece Lt
18301139681 2018-09-01 23:00:00 2018-09-01 23:00:05 1
15910585772 2018-09-01 23:00:00 2018-09-01 23:00:05 1
18810951592 2018-09-01 23:00:00 2018-09-01 23:00:05 1
4. alarm module carry out alarm decision according to the alarm rule customized in advance and alarm, the specific steps are as follows:
4.1. the existing alarm rule customized in advance is as follows:
(1) cell-phone number in blacklist are as follows: 18301139681,13811535239;
(2) mobile phone frequency of occurrence alarm threshold value: 2;
4.2. the feature of each cell-phone number is calculated according to table 2, as shown in table 3;
The duration and frequency characteristic of 3 2018-09-01 23:00:00 of table statistics
Cell-phone number ID Most short resident duration Longest is resident duration Frequency of occurrence
18301139681 5 5 1
15910585772 5 5 1
18810951592 5 5 1
4.3. alarm decision is carried out according to the feature of above-mentioned cell-phone number ID and alarmed, the specific steps are as follows:
4.3.1. 18301139681 blacklist, alarm are in;
4.3.2. alarm module finds the channel ID-101 with group web camera according to mobile phone detector ID-501, to right The network hard disk video recorder request video flowing answered, sends it to client;Alarm module general " cell-phone number: 18301139681, Entry time: 2018-09-01 23:00:00, warning reason: cell-phone number is in blacklist " it is sent to client;
5. characteristic extracting module reads raw information table in 2018-09-01 23:00:05, characteristic information table is generated, specifically Steps are as follows:
5.1 characteristic extracting modules read raw data table, and the data of acquisition are as shown in table 4, and delete the data read;
4 2018-09-01 23:00:05 raw information table of table
There are 18301139681,15910585772 characteristic informations in 5.2 characteristic extracting module query characteristics information tables FI, and it is equal to 5 apart from existing the last item characteristic information FI entry time, characteristic information FI record is updated, as shown in table 5;
Characteristic information FI when 5 2018-09-01 23:00:05 of table
Cell-phone number ID Entry time INt Time departure OUTt Residence time piece Lt
18301139681 2018-09-01 23:00:00 2018-09-01 23:00:10 2
15910585772 2018-09-01 23:00:00 2018-09-01 23:00:10 2
18810951592 2018-09-01 23:00:00 2018-09-01 23:00:05 1
6. alarm module carry out alarm decision according to the alarm rule customized in advance and alarm, the specific steps are as follows:
6.1, according to table 5, calculate feature, as shown in table 6;
The duration and frequency characteristic counted when 6 2018-09-01 23:00:05 of table
Cell-phone number ID Most short resident duration Longest is resident duration Frequency of occurrence
18301139681 10 10 1
15910585772 10 10 1
18810951592 5 5 1
6.2 carry out alarm decision according to the characteristic information FI of above-mentioned cell-phone number ID and alarm, the specific steps are as follows:
6.2.1. 18301139681 blacklist, alarm are in;
6.2.2. alarm module finds the channel ID-101 with group web camera according to mobile phone detector ID-501, to right The network hard disk video recorder request video flowing answered, sends it to client;Alarm module general " cell-phone number: 18301139681, Entry time: 2018-09-01 23:00:00, warning reason: cell-phone number is in blacklist " it is sent to client;
7. characteristic extracting module reads raw information table in 2018-09-01 23:00:10, characteristic information table is generated, specifically Steps are as follows:
7.1. characteristic extracting module reads raw data table, and the data of acquisition are as shown in table 7, and deletes the number read According to;
7 2018-09-01 23:00:10 raw information table of table
7.2. there are 18301139681,15910585772 characteristic informations in characteristic extracting module query characteristics information table FI, and it is equal to 5 apart from existing the last item characteristic information FI entry time;There are 18810951592 characteristic information FI, and It is greater than 5 apart from existing the last item characteristic information FI entry time;Not 13811535239 characteristic information FI, is created for it Build a new FI record;Characteristic information FI record is updated, as shown in table 8;
Characteristic information FI when 8 2018-09-01 23:00:10 of table
Cell-phone number ID Entry time INt Time departure OUTt Residence time piece Lt
18301139681 2018-09-01 23:00:00 2018-09-01 23:00:15 3
15910585772 2018-09-01 23:00:00 2018-09-01 23:00:15 3
18810951592 2018-09-01 23:00:00 2018-09-01 23:00:05 1
13811535239 2018-09-01 23:00:10 2018-09-01 23:00:15 1
18810951592 2018-09-01 23:00:10 2018-09-01 23:00:15 1
8. alarm module carry out alarm decision according to the alarm rule customized in advance and alarm, the specific steps are as follows:
8.1. according to table 8, feature is calculated, as shown in table 9;
The duration and frequency characteristic counted when 9 2018-09-01 23:00:10 of table
Cell-phone number ID Most short resident duration Longest is resident duration Frequency of occurrence
18301139681 15 15 1
15910585772 15 15 1
18810951592 5 5 2
13811535239 5 5 1
8.2. alarm decision is carried out according to the characteristic information FI of above-mentioned cell-phone number ID and alarmed, the specific steps are as follows:
8.2.1. 18301139681,13811535239 blacklist, alarm are in;18810951592 frequency of occurrence is special Sign reaches number alarm threshold value 2, alarms;
8.2.2. alarm module finds the channel ID-101 with group web camera according to mobile phone detector ID-501, to right The network hard disk video recorder request video flowing answered, sends it to client;Alarm module general " cell-phone number: 18301139681, Entry time: 2018-09-01 23:00:00, warning reason: cell-phone number is in blacklist ", " cell-phone number: 18810951592, Entry time: 2018-09-01 23:00:10, warning reason: reach number alarm threshold value 2 ", " cell-phone number: 13811535239, Entry time: 2018-09-01 23:00:10, warning reason: cell-phone number is in blacklist " it is sent to client;
9. rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, it is stored in database, Specific step is as follows:
9.1. the alarm rule based on list is formulated by interactive interface, the specific steps are as follows:
9.1.1. user inputs the cell-phone number ID:18301139681 for needing to alarm, and blacklist table is written in cell-phone number ID In;
9.1.2. user selects 13811535239 in the cell-phone number ID monitored, the cell-phone number ID that user is selected It is written in blacklist table;
9.2. the alarm rule based on feature is formulated by interactive interface, the specific steps are as follows:
9.2.1. user query mobile phone entry time, single is allowed to be resident the features such as duration, frequency of occurrence;
9.2.2. user setting frequency of occurrence alarm threshold value 2;
9.3. based on historical data analysis as a result, automatically generating suspect's alarm rule, the specific steps are as follows:
9.3.1. the regular feature that cell-phone number occurs in analysis of history data, discovery 18810951592 is short-term frequently to go out It is existing, then suspect cell-phone number ID:18810951592 is automatically extracted, suspicion roster is added;
9.3.2. the relevance in analysis of history data between multiple cell-phone numbers, discovery is in blacklist 18301139681 have overlapping with 15910585772 time of occurrence, automatically extract suspect's cell-phone number 15910585772, are added and dislike Doubt roster.
9.4. alarm rule library is written in the alarm rule of above-mentioned generation.
It is finally noted that the purpose for publicizing and implementing example is to help to further understand the present invention, but this field Technical staff be understood that without departing from the spirit and scope of the invention and the appended claims, it is various replacement and repair It is all possible for changing.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is to weigh Subject to the range that sharp claim defines.

Claims (8)

  1. The mobile phone detection alarm method 1. a kind of intelligent video monitoring links, step include:
    A. video monitoring linkage mobile phone detecting and warning system framework is built, the specific steps are as follows:
    A1. system architecture includes web camera, network hard disk video recorder, Alarm Server, client, mobile phone detector;
    A2. mobile phone detector and N platform web camera are mating at one group, and N therein includes but is not limited to 1;
    A3. video flowing is passed to network hard disk video recorder by web camera;
    A4. network hard disk video recorder stores video flowing, and according to the request of Alarm Server, forwards video flowing to alert service Device;
    A5. Alarm Server is responsible for video flowing forwarding, the processing of mobile phone detection information and alarm decision, warning message forwarding;
    B. mobile phone detector obtains cellphone information and saves to database, the specific steps are as follows:
    B1. mobile phone detector appears in the information of mobile phone in signal coverage areas every M seconds automatically scannings, is denoted as raw information, Including but not limited to current time CURt, cell-phone number ID, international mobile subscriber identity IMSI, international mobile equipment identification number IMEI;The M includes but is not limited to 5;
    B2. raw information is saved in raw data table by mobile phone detector;
    C. characteristic extracting module reads raw data table, generates characteristic information table, the specific steps are as follows:
    C1. characteristic extracting module read raw information every M seconds from raw data table, and deleted the data read;
    C2. every raw information is traversed, the characteristic information FI of each cell-phone number ID, write-in or the existing characteristic information of update are generated Table;The characteristic information FI includes but is not limited to cell-phone number ID, entry time INt, residence time piece Lt and time departure OUTt;
    D. alarm module judges and alarms according to alarm rule existing in alarm rule library, the specific steps are as follows:
    D1. according to characteristic information table, the feature of each cell-phone number IDx is calculated;
    D2. alarm decision is carried out according to the characteristic information FI of cell-phone number IDx;
    When E. needing to alarm, by the live video stream and cellphone information synchronized push with mobile phone detector with the web camera of group To client, the specific steps are as follows:
    E1. alarm module finds the channel ID with group web camera according to mobile phone detector ID, records to corresponding network hard disc Camera requests video flowing, sends it to client;
    E2. alarm module will need the cellphone information alarmed to be sent to client, and including but not limited to cell-phone number ID, mobile phone enter Time INt, mobile phone are resident duration, frequency of occurrence AF;
    F. rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, is stored in alarm rule library, Specific step is as follows:
    F1. the alarm rule based on blacklist is formulated by interactive interface;
    F2. the alarm rule based on feature is formulated by interactive interface;
    F3. based on historical data analysis as a result, automatically generating suspect's alarm rule;
    F4. alarm rule library is written into the alarm rule of above-mentioned generation.
  2. Mobile phone detection alarm method, mobile phone detector and N platform net 2. a kind of intelligent video monitoring as described in claim 1 links Network video camera is mating, and at one group, N therein includes but is not limited to 1, is implemented as follows:
    A2.1. web camera is placed in monitoring area, is mounted within K meters of mobile phone detector of effective range, wherein K Including but not limited to 15 meters;
    A2.2. by every group of facility information, including but not limited to position ID, mobile phone detector ID and web camera channel ID, group ID is stored in facility information table.
  3. The mobile phone detection alarm method 3. a kind of intelligent video monitoring as described in claim 1 links, traverses every raw information, The characteristic information FI of each cell-phone number ID, write-in or the existing characteristic information table of update are generated, by taking one of cell-phone number ID as an example, It is denoted as IDx, the specific steps are as follows:
    The characteristic information FI includes but is not limited to cell-phone number ID, entry time INt, residence time piece Lt and time departure OUTt;
    C2.1. whether there is the characteristic information FI of IDx in query characteristics information table;If so, then executing C2.2;It is held if not Row C2.3;
    C2.2. it updates the existing characteristic information of IDx or increases the characteristic information of new IDx, the specific steps are as follows:
    C2.2.1. current time is greater than M apart from existing the last item FI entry time, indicates that IDx is again introduced into one's respective area, is The IDx creates a new FI record: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;When leaving Between be set to " CURt+Lt*M ";
    C2.2.2. current time is equal to M apart from existing the last item FI entry time, indicates that IDx persistently resides in one's respective area, Update existing FI record: entry time INt is constant;Residence time piece Lt adds 1;Time departure is updated to " CURt+Lt*M ";
    C2.3. there is no the record of IDx in characteristic information table, show that IDx enters region for the first time, create a new FI for IDx Record: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;Time departure is set to " CURt+Lt*M ".
  4. The mobile phone detection alarm method 4. a kind of intelligent video monitoring as described in claim 1 links, according to characteristic information table, meter Calculate the following characteristics of each cell-phone number IDx, the specific steps are as follows:
    D1.1. single of the cell-phone number IDx in monitoring region is resident duration Lt*M;When most short resident duration MinLt, longest are resident Long MaxLt;
    D1.2. the frequency of occurrence AF of cell-phone number IDx is the record number of the corresponding FI of the same cell-phone number IDx.
  5. The mobile phone detection alarm method 5. a kind of intelligent video monitoring as described in claim 1 links, according to the spy of cell-phone number IDx Reference ceases FI and carries out alarm decision, the specific steps are as follows:
    D2.1. cell-phone number IDx is in blacklist, then alarms;
    D2.2. the entry time of cell-phone number IDx, single are resident the features such as duration, frequency of occurrence and are in time of fire alarming section or reach Alarm threshold value is then alarmed.
  6. The mobile phone detection alarm method 6. a kind of intelligent video monitoring as described in claim 1 links, is formulated by interactive interface Alarm rule based on blacklist, the specific steps are as follows:
    F1.1. it allows user to input the cell-phone number ID for needing to alarm, cell-phone number ID is written in blacklist table;
    F1.2. user is allowed to select in the cell-phone number ID monitored, in the cell-phone number ID write-in blacklist table that user is selected.
  7. The mobile phone detection alarm method 7. a kind of intelligent video monitoring as described in claim 1 links, is formulated by interactive interface Alarm rule based on feature, the specific steps are as follows:
    F2.1. user query mobile phone entry time, single is allowed to be resident the features such as duration, frequency of occurrence;
    F2.2. the time of fire alarming section of user setting mobile phone entry time is allowed;Single is resident duration corresponding to duration, the frequency and secondary Several alarm threshold values.
  8. The mobile phone detection alarm method 8. a kind of intelligent video monitoring as described in claim 1 links, is based on historical data analysis As a result, automatically generating suspect's alarm rule, the specific steps are as follows:
    F3.1. the regular feature that cell-phone number occurs in analysis of history data automatically extracts suspect cell-phone number ID, and suspicion is added Roster;
    The regularity refers in the alarm rule for being not comprised in and being specified by user, but hides feature in the historical data, Including but not limited to: periodically occurring, frequently occur in short term;
    F3.2. the relevance in analysis of history data between multiple cell-phone numbers automatically extracts suspect's cell-phone number, and suspect is added List;
    The relevance repeatedly occurs simultaneously including but not limited to: 2 or more cell-phone numbers, multiple time of occurrence relies on, with it is black List cell-phone number time of occurrence has overlapping or dependence etc..
CN201811064955.8A 2018-09-13 2018-09-13 A kind of intelligent video monitoring linkage mobile phone detection alarm method Pending CN109218669A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811064955.8A CN109218669A (en) 2018-09-13 2018-09-13 A kind of intelligent video monitoring linkage mobile phone detection alarm method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811064955.8A CN109218669A (en) 2018-09-13 2018-09-13 A kind of intelligent video monitoring linkage mobile phone detection alarm method

Publications (1)

Publication Number Publication Date
CN109218669A true CN109218669A (en) 2019-01-15

Family

ID=64983516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811064955.8A Pending CN109218669A (en) 2018-09-13 2018-09-13 A kind of intelligent video monitoring linkage mobile phone detection alarm method

Country Status (1)

Country Link
CN (1) CN109218669A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112258718A (en) * 2020-09-27 2021-01-22 中国建设银行股份有限公司 Human body temperature measurement and personnel identification method and system
CN116033070A (en) * 2021-10-27 2023-04-28 中移(杭州)信息技术有限公司 Alarm method and device based on signal detection and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202035094U (en) * 2010-11-13 2011-11-09 尤路 Video monitoring system with suspect handset identification number collecting apparatus
US20150095107A1 (en) * 2013-09-27 2015-04-02 Panasonic Corporation Stay duration measurement device, stay duration measurement system and stay duration measurement method
CN106254142A (en) * 2016-09-05 2016-12-21 电子科技大学成都研究院 A kind of city colonies based on mobile communication operators data behavior monitoring system
CN106251030A (en) * 2015-06-12 2016-12-21 台湾色彩与影像科技股份有限公司 Monitoring and warning method
CN107231545A (en) * 2017-06-22 2017-10-03 北京工商大学 A kind of method of the monitoring remote video based on smart mobile phone
CN107784769A (en) * 2016-08-26 2018-03-09 杭州海康威视系统技术有限公司 A kind of alarm method, apparatus and system
CN107967663A (en) * 2017-12-11 2018-04-27 西安立东行智能技术有限公司 A kind of region of deploying to ensure effective monitoring and control of illegal activities prevents the unauthorized automatic alarm system and method swarmed into
CN108333584A (en) * 2017-12-28 2018-07-27 陕西弘毅军民融合智能科技有限公司 A kind of remote unmanned plane detection system of low altitude small target and detection method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202035094U (en) * 2010-11-13 2011-11-09 尤路 Video monitoring system with suspect handset identification number collecting apparatus
US20150095107A1 (en) * 2013-09-27 2015-04-02 Panasonic Corporation Stay duration measurement device, stay duration measurement system and stay duration measurement method
CN106251030A (en) * 2015-06-12 2016-12-21 台湾色彩与影像科技股份有限公司 Monitoring and warning method
CN107784769A (en) * 2016-08-26 2018-03-09 杭州海康威视系统技术有限公司 A kind of alarm method, apparatus and system
CN106254142A (en) * 2016-09-05 2016-12-21 电子科技大学成都研究院 A kind of city colonies based on mobile communication operators data behavior monitoring system
CN107231545A (en) * 2017-06-22 2017-10-03 北京工商大学 A kind of method of the monitoring remote video based on smart mobile phone
CN107967663A (en) * 2017-12-11 2018-04-27 西安立东行智能技术有限公司 A kind of region of deploying to ensure effective monitoring and control of illegal activities prevents the unauthorized automatic alarm system and method swarmed into
CN108333584A (en) * 2017-12-28 2018-07-27 陕西弘毅军民融合智能科技有限公司 A kind of remote unmanned plane detection system of low altitude small target and detection method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112258718A (en) * 2020-09-27 2021-01-22 中国建设银行股份有限公司 Human body temperature measurement and personnel identification method and system
CN116033070A (en) * 2021-10-27 2023-04-28 中移(杭州)信息技术有限公司 Alarm method and device based on signal detection and storage medium

Similar Documents

Publication Publication Date Title
US11929870B2 (en) Correlation engine for correlating sensory events
CN109858365B (en) Special crowd gathering behavior analysis method and device and electronic equipment
US7595815B2 (en) Apparatus, methods, and systems for intelligent security and safety
KR101297295B1 (en) Security control system by face recognition
US7847820B2 (en) Intelligent event determination and notification in a surveillance system
US8730040B2 (en) Systems, methods, and apparatus for monitoring and alerting on large sensory data sets for improved safety, security, and business productivity
CN103384321B (en) The system and method for rear event/alert analysis in CCTV and Integrative security system
CN111612113A (en) Epidemic prevention control method, device, system, storage medium and processor
CN109191761A (en) A kind of method for recognizing fire disaster based on flame multiple features fusion
CN108073577A (en) A kind of alarm method and system based on recognition of face
CN106780250B (en) Intelligent community security event processing method and system based on Internet of things technology
TW200530805A (en) Database user behavior monitor system and method
Bauman et al. Using social sensors for detecting emergency events: a case of power outages in the electrical utility industry
KR20180118979A (en) Method and apparatus for risk detection, prediction, and its correspondence for public safety based on multiple complex information
CN113178050B (en) Smart community management system
CN115966313B (en) Integrated management platform based on face recognition
CN109218669A (en) A kind of intelligent video monitoring linkage mobile phone detection alarm method
KR102084687B1 (en) Security operation service method and system for detecting illegal photography
CN109120896B (en) Security video monitoring guard system
US8344878B2 (en) Method and apparatus for the creation of an event-associated electronic device directory
CN111400415A (en) Management method and related device for stability-related personnel
CN210983509U (en) Entry key group distribution and control system
CN105453149A (en) Crime evidence provider cum help seeker
Mahmood Ali et al. Strategies and tools for effective suspicious event detection from video: a survey perspective (COVID-19)
Khot Harish et al. Smart video surveillance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190115

WD01 Invention patent application deemed withdrawn after publication