CN109218669A - A kind of intelligent video monitoring linkage mobile phone detection alarm method - Google Patents
A kind of intelligent video monitoring linkage mobile phone detection alarm method Download PDFInfo
- Publication number
- CN109218669A CN109218669A CN201811064955.8A CN201811064955A CN109218669A CN 109218669 A CN109218669 A CN 109218669A CN 201811064955 A CN201811064955 A CN 201811064955A CN 109218669 A CN109218669 A CN 109218669A
- Authority
- CN
- China
- Prior art keywords
- alarm
- mobile phone
- cell
- phone number
- idx
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/907—Television signal recording using static stores, e.g. storage tubes or semiconductor memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Abstract
The present invention proposes a kind of intelligent video monitoring linkage mobile phone detection alarm method, builds the system architecture constituted including web camera, network hard disk video recorder, Alarm Server, client, mobile phone detector;Mobile phone detector obtains mobile phone raw information, and characteristic extracting module extracts the characteristic information that mobile phone occurs, and alarm module judges and alarms according to alarm rule, and by live video stream and cellphone information synchronized push to client;Rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, is stored in alarm rule library.This method obtains cellphone information in real time and merges video alarm, intelligence generates alarm rule, intelligent video monitoring alarm system is set to have many advantages, such as that discovery in real time, information is accurate, video evidence is complete, intelligence discovery suspect, greatly improve the automation, intelligence, alarm accuracy of system, and the alert identification and capability of fast response of security department, there is good application value and economic benefit.
Description
Technical field
The present invention relates to video monitoring linkage mobile phone alarms, and in particular to a kind of intelligent video monitoring linkage mobile phone detection report
Alarm method belongs to intelligent security guard field of video monitoring.
Background technique
In safe city monitoring project, high-definition video monitoring is all deployed in each key area, but most of videos are supervised
Control no intellectual analysis and linkage mobile phone detector.Allow monitor video pictures, institute security protection staff's moment due to being difficult to
It is mainly used for post-mordem forensics with video monitoring image.In some special cases, such as under the night scenes of College Dormitory,
Criminal steals clothes in outdoor balcony, is often difficult to find in time.When Deng finding merit, the opportunity arrested has been had already passed by,
But when next habitual offender commits a crime again, due to not timing and dark etc., the opportunity of arresting can be still missed, such case becomes very
The thorny problem that more Security Departments of enterprises and institutions shop front is faced.Commonly used with mobile phone, many criminals are carry-on
Carrying mobile phone improves the recognition capability to abnormal conditions and alert if intelligent video monitoring can be linked to mobile phone detection alarm,
It can be at the time of committing a crime for the first time and place gets monitor video and mobile phone relevant information, when criminal occurs again and Times
Police arrests, and meets the needs of security department's active, real time monitoring early warning.
Some video monitoring alarm methods or system are had already appeared at present, such as the Shenzhen river Fan Haisan electronics share has
The video monitoring and firefighting warning linkage method and system (CN201610826003.X) of limit company design, the system pass through fire-fighting
Alarm and the alarm joint alarm of video monitoring intellectual analysis, are mutually authenticated alert and audit, reduce rate of false alarm, it is quasi- to improve alarm
Exactness.Linkage of the patent mainly for fire-fighting event and video.The prison of video disclosed in Shenzhen DSW Electronic Co., Ltd.
It controls alarm system (CN201220259721.0), this system provides video monitorings and telephone phonic alarm function, are generating report
Picture is captured when alert signal and recorded video is checked for user.People's incoming call telephone alarm is needed, system captures picture and video recording automatically.
The video monitoring alarm method and system (CN201710087254.5) of upper SeaBird rice Science and Technology Ltd. design, utilize artificial intelligence
Energy method, which refine to video, is converted into text, picture, voice, and user just can know that asking for alert content without look at video
Topic, saves user time, improves information acquisition efficiency.
The present invention is directed to different alarm demands from the above patent, and function and effect be not also identical.The present invention by with hand
Machine detector linkage, detect mobile phone signal automatically, and judge automatically according to alarm rule and whether need to alarm, by real-time video,
The relevant informations such as cell-phone number, warning reason are sent to client, improve the recognition capability to alert;The invention patent can also root
Alarm rule is generated according to the setting of administrator;Intellectual analysis is carried out to historical data, extracts suspicious cell-phone number occurrence law, from
Movable property gives birth to alarm rule, greatly improves intelligence degree.Automation, the intelligence of existing video monitoring system can be effectively improved
Change, alarm accuracy, timeliness etc. have very big application value and commercial value.
Summary of the invention
The present invention proposes a kind of intelligent video monitoring linkage mobile phone detection alarm method, and this method is built including network shooting
The video monitoring linkage mobile phone detection alarm that machine, network hard disk video recorder, Alarm Server, client, mobile phone detector are constituted
System architecture;Mobile phone detector obtains cellphone information and saves to database;Characteristic extracting module is extracted in raw data table
Feature generates characteristic information table;Alarm module judges and alarms according to alarm rule existing in alarm rule library;It needs to alarm
When, by the live video stream and cellphone information synchronized push that monitor the phone area to client;Rules customization module is based on intelligence
It can analyze and user's interaction customization generates three classes alarm rule, deposit alarm rule library.Specifically, the method for the present invention includes
The following steps:
A. video monitoring linkage mobile phone detecting and warning system framework is built, the specific steps are as follows:
A1. system architecture includes web camera, network hard disk video recorder, Alarm Server, client, mobile phone detection
Device;
A2. mobile phone detector and N platform web camera are mating at one group, and N therein includes but is not limited to 1, specific steps
It is as follows:
A2.1. web camera is placed in monitoring area, is mounted within K meters of mobile phone detector of effective range,
Wherein K includes but is not limited to 15 meters;
A2.2. by every group of facility information, including but not limited to position ID, mobile phone detector ID and web camera channel
ID, group ID, are stored in facility information table;
A3. video flowing is passed to network hard disk video recorder by web camera;
A4. network hard disk video recorder stores video flowing, and according to the request of Alarm Server, video flowing is forwarded to take to alarm
Business device;
A5. Alarm Server is responsible for video flowing forwarding, cellphone information processing and alarm decision, warning message forwarding;
B. mobile phone detector obtains cellphone information and saves to database, the specific steps are as follows:
B1. mobile phone detector appears in the information of mobile phone in signal coverage areas every M seconds automatically scannings, is denoted as original letter
Breath, including but not limited to current time CURt, cell-phone number ID, international mobile subscriber identity IMSI, international mobile device identification
Code IMEI;The M includes but is not limited to 5;
B2. raw information is saved in raw data table by mobile phone detector;
C. characteristic extracting module reads raw data table, generates characteristic information table, the specific steps are as follows:
C1. characteristic extracting module read raw information every M seconds from raw data table, and deleted the data read;
C2. every raw information is traversed, the characteristic information FI of each cell-phone number ID, write-in or the existing feature letter of update are generated
Breath table is denoted as IDx by taking one of cell-phone number ID as an example, the specific steps are as follows:
When the characteristic information FI includes but is not limited to cell-phone number ID, entry time INt, residence time piece Lt and leaves
Between OUTt;
C2.1. whether there is the characteristic information FI of IDx in query characteristics information table;If so, then executing C2.2;If no
Then execute C2.3;
C2.2. it updates the existing characteristic information of IDx or increases the characteristic information of new IDx, the specific steps are as follows:
C2.2.1. current time is greater than M apart from existing the last item FI entry time, indicates that IDx is again introduced into local area
Domain, create a new FI record for the IDx: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;From
ETAD expected time of arrival and departure is set to " CURt+Lt*M ";
C2.2.2. current time is equal to M apart from existing the last item FI entry time, indicates that IDx persistently resides in this
Region, update existing FI record: entry time INt is constant;Residence time piece Lt adds 1;Time departure is updated to " CURt+Lt*
M";
C2.3. there is no the record of IDx in characteristic information table, show that IDx enters region for the first time, create one newly for IDx
FI record: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;Time departure is set to " CURt+Lt*
M";
D. alarm module judges and alarms according to alarm rule existing in alarm rule library, the specific steps are as follows:
D1. according to characteristic information table, the following characteristics of each cell-phone number IDx are calculated, the specific steps are as follows:
D1.1. single of the cell-phone number IDx in monitoring region is resident duration Lt*M;Most short resident duration MinLt, most reside permanently
Stay duration MaxLt;
D1.2. the frequency of occurrence AF of cell-phone number IDx is the record number of the corresponding FI of the same cell-phone number IDx;
D2. alarm decision is carried out according to the characteristic information FI of cell-phone number IDx, the specific steps are as follows:
D2.1. cell-phone number IDx is in blacklist, then alarms;
D2.2. the entry time of cell-phone number IDx, single be resident the features such as duration, frequency of occurrence be in time of fire alarming section or
Reach alarm threshold value, then alarms;
It, will be synchronous with the live video stream and cellphone information of the web camera of group with mobile phone detector when E. needing to alarm
It is pushed to client, the specific steps are as follows:
E1. alarm module finds the channel ID with group web camera according to mobile phone detector ID, hard to corresponding network
Disk video recorder requests video flowing, sends it to client;
E2. alarm module will need the cellphone information alarmed to be sent to client, including but not limited to cell-phone number ID, mobile phone
Entry time INt, mobile phone are resident duration, frequency of occurrence AF;
F. rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, is stored in alarm rule
Library, the specific steps are as follows:
F1. the alarm rule based on blacklist is formulated by interactive interface, the specific steps are as follows:
F1.1. it allows user to input the cell-phone number ID for needing to alarm, cell-phone number ID is written in blacklist table:
F1.2. user is allowed to select in the cell-phone number ID monitored, blacklist is written in the cell-phone number ID that user is selected
In table;
F2. the alarm rule based on feature is formulated by interactive interface, the specific steps are as follows:
F2.1. user query mobile phone entry time, single is allowed to be resident the features such as duration, frequency of occurrence;
F2.2. the time of fire alarming section of user setting mobile phone entry time is allowed;Single is resident duration corresponding to duration, the frequency
With the alarm threshold value of number;
F3. based on historical data analysis as a result, automatically generating suspect's alarm rule, the specific steps are as follows:
F3.1. the regular feature that cell-phone number occurs in analysis of history data, automatically extracts suspect cell-phone number ID, is added
Suspicion roster;
The regularity refers in the alarm rule for being not comprised in and being specified by user, but hides spy in the historical data
Sign, including but not limited to: periodically occurring, frequently occur in short term;
F3.2. the relevance in analysis of history data between multiple cell-phone numbers automatically extracts suspect's cell-phone number, is added and dislikes
Doubt roster;
The relevance repeatedly occurs simultaneously including but not limited to: 2 or more cell-phone numbers, multiple time of occurrence relies on,
There is overlapping or dependence etc. with blacklist cell-phone number time of occurrence;
F4. alarm rule library is written into the alarm rule of above-mentioned generation.
Intelligent video monitoring proposed by the present invention links mobile phone detection alarm method, can obtain cellphone information and real in time
When extract feature, alarmed according to the alarm rule customized in advance;The live video stream synchronous with mobile phone can also be synchronized and be pushed away
Give client;Alarm rule can be automatically generated based on data analysis and user's interaction, so that intelligent monitoring and alarming system has
Have the advantages that discovery in real time, information is accurate, video evidence is complete, intelligence discovery suspect, greatly improves automation, the intelligence of system
Energyization, alarm accuracy and the identification of the alert of security department and capability of fast response, have good application value and warp
Ji benefit.
Detailed description of the invention
A kind of Fig. 1: intelligent video monitoring linkage mobile phone detection alarm method flow chart;
Specific embodiment
With reference to the accompanying drawing, by illustrate certain colleges and universities' video monitoring system and mobile phone detection interlink warning method mistake
Journey is described further the method for the present invention as embodiment.
Method flow diagram is as shown in Figure 1.The method of the present invention includes: 1) to build video monitoring linkage mobile phone detecting and warning system
Framework;2) mobile phone detector obtains cellphone information and saves to database;3) characteristic extracting module reads raw data table, generates
Characteristic information table;4) alarm module judges and alarms according to alarm rule existing in alarm rule library;It 5), will when needing to alarm
The live video stream and cellphone information synchronized push for monitoring the phone area are to client;6) rules customization module is based on intelligence point
Analysis and user's interaction customization generate three classes alarm rule, are stored in alarm rule library.Specific implementation step is as follows:
1. building video monitoring mobile phone interlink alarm system framework, the specific steps are as follows:
1.1. system architecture includes web camera, network hard disk video recorder, Alarm Server, client, mobile phone detection
Device;
1.2. mobile phone detector and 1 web camera are mating at one group, the specific steps are as follows:
1.2.1. web camera is placed in monitoring area, is mounted in the range of 15 meters of mobile phone detector;
1.2.2. by position ID (west gate -1), mobile phone detector ID-501, web camera channel ID-101, equipment group
ID-0001 is stored in facility information table;
1.3. video flowing is passed to network hard disk video recorder by web camera;
1.4. network hard disk video recorder stores video flowing, and according to the request of Alarm Server, forwards video flowing to alarm
Server;
1.5. Alarm Server is responsible for video flowing forwarding, the processing of mobile phone detection information and alarm decision, warning message forwarding;
2. mobile phone detector obtains cellphone information and saves to database, the specific steps are as follows:
2.1 mobile phone detectors are respectively in 2018-09-01 23:00:00,2018-09-01 23:00:05,2018-09-01
Tri- moment of 23:00:10, automatically scanning appear in the information of mobile phone in overlay area;
Raw information is saved in raw data table by 2.2 mobile phone detectors, as shown in table 1, table 4, table 7;
3. characteristic extracting module reads raw data table in 2018-09-01 23:00:00, characteristic information table is generated, specifically
Steps are as follows:
3.1. characteristic extracting module reads raw data table, and the data of acquisition are as shown in table 1, and deletes the number read
According to;
1 2018-09-01 23:00:00 raw information table of table
3.2. there is no 18301139681 in characteristic extracting module query characteristics information table, 15910585772,
A new FI record is respectively created for above three cell-phone number ID, as shown in table 2 in 18810951592 characteristic information FI;
Characteristic information FI when 2 2018-09-01 23:00:00 of table
Cell-phone number ID | Entry time INt | Time departure OUTt | Residence time piece Lt |
18301139681 | 2018-09-01 23:00:00 | 2018-09-01 23:00:05 | 1 |
15910585772 | 2018-09-01 23:00:00 | 2018-09-01 23:00:05 | 1 |
18810951592 | 2018-09-01 23:00:00 | 2018-09-01 23:00:05 | 1 |
4. alarm module carry out alarm decision according to the alarm rule customized in advance and alarm, the specific steps are as follows:
4.1. the existing alarm rule customized in advance is as follows:
(1) cell-phone number in blacklist are as follows: 18301139681,13811535239;
(2) mobile phone frequency of occurrence alarm threshold value: 2;
4.2. the feature of each cell-phone number is calculated according to table 2, as shown in table 3;
The duration and frequency characteristic of 3 2018-09-01 23:00:00 of table statistics
Cell-phone number ID | Most short resident duration | Longest is resident duration | Frequency of occurrence |
18301139681 | 5 | 5 | 1 |
15910585772 | 5 | 5 | 1 |
18810951592 | 5 | 5 | 1 |
4.3. alarm decision is carried out according to the feature of above-mentioned cell-phone number ID and alarmed, the specific steps are as follows:
4.3.1. 18301139681 blacklist, alarm are in;
4.3.2. alarm module finds the channel ID-101 with group web camera according to mobile phone detector ID-501, to right
The network hard disk video recorder request video flowing answered, sends it to client;Alarm module general " cell-phone number: 18301139681,
Entry time: 2018-09-01 23:00:00, warning reason: cell-phone number is in blacklist " it is sent to client;
5. characteristic extracting module reads raw information table in 2018-09-01 23:00:05, characteristic information table is generated, specifically
Steps are as follows:
5.1 characteristic extracting modules read raw data table, and the data of acquisition are as shown in table 4, and delete the data read;
4 2018-09-01 23:00:05 raw information table of table
There are 18301139681,15910585772 characteristic informations in 5.2 characteristic extracting module query characteristics information tables
FI, and it is equal to 5 apart from existing the last item characteristic information FI entry time, characteristic information FI record is updated, as shown in table 5;
Characteristic information FI when 5 2018-09-01 23:00:05 of table
Cell-phone number ID | Entry time INt | Time departure OUTt | Residence time piece Lt |
18301139681 | 2018-09-01 23:00:00 | 2018-09-01 23:00:10 | 2 |
15910585772 | 2018-09-01 23:00:00 | 2018-09-01 23:00:10 | 2 |
18810951592 | 2018-09-01 23:00:00 | 2018-09-01 23:00:05 | 1 |
6. alarm module carry out alarm decision according to the alarm rule customized in advance and alarm, the specific steps are as follows:
6.1, according to table 5, calculate feature, as shown in table 6;
The duration and frequency characteristic counted when 6 2018-09-01 23:00:05 of table
Cell-phone number ID | Most short resident duration | Longest is resident duration | Frequency of occurrence |
18301139681 | 10 | 10 | 1 |
15910585772 | 10 | 10 | 1 |
18810951592 | 5 | 5 | 1 |
6.2 carry out alarm decision according to the characteristic information FI of above-mentioned cell-phone number ID and alarm, the specific steps are as follows:
6.2.1. 18301139681 blacklist, alarm are in;
6.2.2. alarm module finds the channel ID-101 with group web camera according to mobile phone detector ID-501, to right
The network hard disk video recorder request video flowing answered, sends it to client;Alarm module general " cell-phone number: 18301139681,
Entry time: 2018-09-01 23:00:00, warning reason: cell-phone number is in blacklist " it is sent to client;
7. characteristic extracting module reads raw information table in 2018-09-01 23:00:10, characteristic information table is generated, specifically
Steps are as follows:
7.1. characteristic extracting module reads raw data table, and the data of acquisition are as shown in table 7, and deletes the number read
According to;
7 2018-09-01 23:00:10 raw information table of table
7.2. there are 18301139681,15910585772 characteristic informations in characteristic extracting module query characteristics information table
FI, and it is equal to 5 apart from existing the last item characteristic information FI entry time;There are 18810951592 characteristic information FI, and
It is greater than 5 apart from existing the last item characteristic information FI entry time;Not 13811535239 characteristic information FI, is created for it
Build a new FI record;Characteristic information FI record is updated, as shown in table 8;
Characteristic information FI when 8 2018-09-01 23:00:10 of table
Cell-phone number ID | Entry time INt | Time departure OUTt | Residence time piece Lt |
18301139681 | 2018-09-01 23:00:00 | 2018-09-01 23:00:15 | 3 |
15910585772 | 2018-09-01 23:00:00 | 2018-09-01 23:00:15 | 3 |
18810951592 | 2018-09-01 23:00:00 | 2018-09-01 23:00:05 | 1 |
13811535239 | 2018-09-01 23:00:10 | 2018-09-01 23:00:15 | 1 |
18810951592 | 2018-09-01 23:00:10 | 2018-09-01 23:00:15 | 1 |
8. alarm module carry out alarm decision according to the alarm rule customized in advance and alarm, the specific steps are as follows:
8.1. according to table 8, feature is calculated, as shown in table 9;
The duration and frequency characteristic counted when 9 2018-09-01 23:00:10 of table
Cell-phone number ID | Most short resident duration | Longest is resident duration | Frequency of occurrence |
18301139681 | 15 | 15 | 1 |
15910585772 | 15 | 15 | 1 |
18810951592 | 5 | 5 | 2 |
13811535239 | 5 | 5 | 1 |
8.2. alarm decision is carried out according to the characteristic information FI of above-mentioned cell-phone number ID and alarmed, the specific steps are as follows:
8.2.1. 18301139681,13811535239 blacklist, alarm are in;18810951592 frequency of occurrence is special
Sign reaches number alarm threshold value 2, alarms;
8.2.2. alarm module finds the channel ID-101 with group web camera according to mobile phone detector ID-501, to right
The network hard disk video recorder request video flowing answered, sends it to client;Alarm module general " cell-phone number: 18301139681,
Entry time: 2018-09-01 23:00:00, warning reason: cell-phone number is in blacklist ", " cell-phone number: 18810951592,
Entry time: 2018-09-01 23:00:10, warning reason: reach number alarm threshold value 2 ", " cell-phone number: 13811535239,
Entry time: 2018-09-01 23:00:10, warning reason: cell-phone number is in blacklist " it is sent to client;
9. rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, it is stored in database,
Specific step is as follows:
9.1. the alarm rule based on list is formulated by interactive interface, the specific steps are as follows:
9.1.1. user inputs the cell-phone number ID:18301139681 for needing to alarm, and blacklist table is written in cell-phone number ID
In;
9.1.2. user selects 13811535239 in the cell-phone number ID monitored, the cell-phone number ID that user is selected
It is written in blacklist table;
9.2. the alarm rule based on feature is formulated by interactive interface, the specific steps are as follows:
9.2.1. user query mobile phone entry time, single is allowed to be resident the features such as duration, frequency of occurrence;
9.2.2. user setting frequency of occurrence alarm threshold value 2;
9.3. based on historical data analysis as a result, automatically generating suspect's alarm rule, the specific steps are as follows:
9.3.1. the regular feature that cell-phone number occurs in analysis of history data, discovery 18810951592 is short-term frequently to go out
It is existing, then suspect cell-phone number ID:18810951592 is automatically extracted, suspicion roster is added;
9.3.2. the relevance in analysis of history data between multiple cell-phone numbers, discovery is in blacklist
18301139681 have overlapping with 15910585772 time of occurrence, automatically extract suspect's cell-phone number 15910585772, are added and dislike
Doubt roster.
9.4. alarm rule library is written in the alarm rule of above-mentioned generation.
It is finally noted that the purpose for publicizing and implementing example is to help to further understand the present invention, but this field
Technical staff be understood that without departing from the spirit and scope of the invention and the appended claims, it is various replacement and repair
It is all possible for changing.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is to weigh
Subject to the range that sharp claim defines.
Claims (8)
- The mobile phone detection alarm method 1. a kind of intelligent video monitoring links, step include:A. video monitoring linkage mobile phone detecting and warning system framework is built, the specific steps are as follows:A1. system architecture includes web camera, network hard disk video recorder, Alarm Server, client, mobile phone detector;A2. mobile phone detector and N platform web camera are mating at one group, and N therein includes but is not limited to 1;A3. video flowing is passed to network hard disk video recorder by web camera;A4. network hard disk video recorder stores video flowing, and according to the request of Alarm Server, forwards video flowing to alert service Device;A5. Alarm Server is responsible for video flowing forwarding, the processing of mobile phone detection information and alarm decision, warning message forwarding;B. mobile phone detector obtains cellphone information and saves to database, the specific steps are as follows:B1. mobile phone detector appears in the information of mobile phone in signal coverage areas every M seconds automatically scannings, is denoted as raw information, Including but not limited to current time CURt, cell-phone number ID, international mobile subscriber identity IMSI, international mobile equipment identification number IMEI;The M includes but is not limited to 5;B2. raw information is saved in raw data table by mobile phone detector;C. characteristic extracting module reads raw data table, generates characteristic information table, the specific steps are as follows:C1. characteristic extracting module read raw information every M seconds from raw data table, and deleted the data read;C2. every raw information is traversed, the characteristic information FI of each cell-phone number ID, write-in or the existing characteristic information of update are generated Table;The characteristic information FI includes but is not limited to cell-phone number ID, entry time INt, residence time piece Lt and time departure OUTt;D. alarm module judges and alarms according to alarm rule existing in alarm rule library, the specific steps are as follows:D1. according to characteristic information table, the feature of each cell-phone number IDx is calculated;D2. alarm decision is carried out according to the characteristic information FI of cell-phone number IDx;When E. needing to alarm, by the live video stream and cellphone information synchronized push with mobile phone detector with the web camera of group To client, the specific steps are as follows:E1. alarm module finds the channel ID with group web camera according to mobile phone detector ID, records to corresponding network hard disc Camera requests video flowing, sends it to client;E2. alarm module will need the cellphone information alarmed to be sent to client, and including but not limited to cell-phone number ID, mobile phone enter Time INt, mobile phone are resident duration, frequency of occurrence AF;F. rules customization module is based on intellectual analysis and user's interaction customization generates three classes alarm rule, is stored in alarm rule library, Specific step is as follows:F1. the alarm rule based on blacklist is formulated by interactive interface;F2. the alarm rule based on feature is formulated by interactive interface;F3. based on historical data analysis as a result, automatically generating suspect's alarm rule;F4. alarm rule library is written into the alarm rule of above-mentioned generation.
- Mobile phone detection alarm method, mobile phone detector and N platform net 2. a kind of intelligent video monitoring as described in claim 1 links Network video camera is mating, and at one group, N therein includes but is not limited to 1, is implemented as follows:A2.1. web camera is placed in monitoring area, is mounted within K meters of mobile phone detector of effective range, wherein K Including but not limited to 15 meters;A2.2. by every group of facility information, including but not limited to position ID, mobile phone detector ID and web camera channel ID, group ID is stored in facility information table.
- The mobile phone detection alarm method 3. a kind of intelligent video monitoring as described in claim 1 links, traverses every raw information, The characteristic information FI of each cell-phone number ID, write-in or the existing characteristic information table of update are generated, by taking one of cell-phone number ID as an example, It is denoted as IDx, the specific steps are as follows:The characteristic information FI includes but is not limited to cell-phone number ID, entry time INt, residence time piece Lt and time departure OUTt;C2.1. whether there is the characteristic information FI of IDx in query characteristics information table;If so, then executing C2.2;It is held if not Row C2.3;C2.2. it updates the existing characteristic information of IDx or increases the characteristic information of new IDx, the specific steps are as follows:C2.2.1. current time is greater than M apart from existing the last item FI entry time, indicates that IDx is again introduced into one's respective area, is The IDx creates a new FI record: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;When leaving Between be set to " CURt+Lt*M ";C2.2.2. current time is equal to M apart from existing the last item FI entry time, indicates that IDx persistently resides in one's respective area, Update existing FI record: entry time INt is constant;Residence time piece Lt adds 1;Time departure is updated to " CURt+Lt*M ";C2.3. there is no the record of IDx in characteristic information table, show that IDx enters region for the first time, create a new FI for IDx Record: current time CURt is denoted as entry time INt;Residence time piece Lt is set to 1;Time departure is set to " CURt+Lt*M ".
- The mobile phone detection alarm method 4. a kind of intelligent video monitoring as described in claim 1 links, according to characteristic information table, meter Calculate the following characteristics of each cell-phone number IDx, the specific steps are as follows:D1.1. single of the cell-phone number IDx in monitoring region is resident duration Lt*M;When most short resident duration MinLt, longest are resident Long MaxLt;D1.2. the frequency of occurrence AF of cell-phone number IDx is the record number of the corresponding FI of the same cell-phone number IDx.
- The mobile phone detection alarm method 5. a kind of intelligent video monitoring as described in claim 1 links, according to the spy of cell-phone number IDx Reference ceases FI and carries out alarm decision, the specific steps are as follows:D2.1. cell-phone number IDx is in blacklist, then alarms;D2.2. the entry time of cell-phone number IDx, single are resident the features such as duration, frequency of occurrence and are in time of fire alarming section or reach Alarm threshold value is then alarmed.
- The mobile phone detection alarm method 6. a kind of intelligent video monitoring as described in claim 1 links, is formulated by interactive interface Alarm rule based on blacklist, the specific steps are as follows:F1.1. it allows user to input the cell-phone number ID for needing to alarm, cell-phone number ID is written in blacklist table;F1.2. user is allowed to select in the cell-phone number ID monitored, in the cell-phone number ID write-in blacklist table that user is selected.
- The mobile phone detection alarm method 7. a kind of intelligent video monitoring as described in claim 1 links, is formulated by interactive interface Alarm rule based on feature, the specific steps are as follows:F2.1. user query mobile phone entry time, single is allowed to be resident the features such as duration, frequency of occurrence;F2.2. the time of fire alarming section of user setting mobile phone entry time is allowed;Single is resident duration corresponding to duration, the frequency and secondary Several alarm threshold values.
- The mobile phone detection alarm method 8. a kind of intelligent video monitoring as described in claim 1 links, is based on historical data analysis As a result, automatically generating suspect's alarm rule, the specific steps are as follows:F3.1. the regular feature that cell-phone number occurs in analysis of history data automatically extracts suspect cell-phone number ID, and suspicion is added Roster;The regularity refers in the alarm rule for being not comprised in and being specified by user, but hides feature in the historical data, Including but not limited to: periodically occurring, frequently occur in short term;F3.2. the relevance in analysis of history data between multiple cell-phone numbers automatically extracts suspect's cell-phone number, and suspect is added List;The relevance repeatedly occurs simultaneously including but not limited to: 2 or more cell-phone numbers, multiple time of occurrence relies on, with it is black List cell-phone number time of occurrence has overlapping or dependence etc..
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811064955.8A CN109218669A (en) | 2018-09-13 | 2018-09-13 | A kind of intelligent video monitoring linkage mobile phone detection alarm method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811064955.8A CN109218669A (en) | 2018-09-13 | 2018-09-13 | A kind of intelligent video monitoring linkage mobile phone detection alarm method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109218669A true CN109218669A (en) | 2019-01-15 |
Family
ID=64983516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811064955.8A Pending CN109218669A (en) | 2018-09-13 | 2018-09-13 | A kind of intelligent video monitoring linkage mobile phone detection alarm method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109218669A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112258718A (en) * | 2020-09-27 | 2021-01-22 | 中国建设银行股份有限公司 | Human body temperature measurement and personnel identification method and system |
CN116033070A (en) * | 2021-10-27 | 2023-04-28 | 中移(杭州)信息技术有限公司 | Alarm method and device based on signal detection and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202035094U (en) * | 2010-11-13 | 2011-11-09 | 尤路 | Video monitoring system with suspect handset identification number collecting apparatus |
US20150095107A1 (en) * | 2013-09-27 | 2015-04-02 | Panasonic Corporation | Stay duration measurement device, stay duration measurement system and stay duration measurement method |
CN106254142A (en) * | 2016-09-05 | 2016-12-21 | 电子科技大学成都研究院 | A kind of city colonies based on mobile communication operators data behavior monitoring system |
CN106251030A (en) * | 2015-06-12 | 2016-12-21 | 台湾色彩与影像科技股份有限公司 | Monitoring and warning method |
CN107231545A (en) * | 2017-06-22 | 2017-10-03 | 北京工商大学 | A kind of method of the monitoring remote video based on smart mobile phone |
CN107784769A (en) * | 2016-08-26 | 2018-03-09 | 杭州海康威视系统技术有限公司 | A kind of alarm method, apparatus and system |
CN107967663A (en) * | 2017-12-11 | 2018-04-27 | 西安立东行智能技术有限公司 | A kind of region of deploying to ensure effective monitoring and control of illegal activities prevents the unauthorized automatic alarm system and method swarmed into |
CN108333584A (en) * | 2017-12-28 | 2018-07-27 | 陕西弘毅军民融合智能科技有限公司 | A kind of remote unmanned plane detection system of low altitude small target and detection method |
-
2018
- 2018-09-13 CN CN201811064955.8A patent/CN109218669A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202035094U (en) * | 2010-11-13 | 2011-11-09 | 尤路 | Video monitoring system with suspect handset identification number collecting apparatus |
US20150095107A1 (en) * | 2013-09-27 | 2015-04-02 | Panasonic Corporation | Stay duration measurement device, stay duration measurement system and stay duration measurement method |
CN106251030A (en) * | 2015-06-12 | 2016-12-21 | 台湾色彩与影像科技股份有限公司 | Monitoring and warning method |
CN107784769A (en) * | 2016-08-26 | 2018-03-09 | 杭州海康威视系统技术有限公司 | A kind of alarm method, apparatus and system |
CN106254142A (en) * | 2016-09-05 | 2016-12-21 | 电子科技大学成都研究院 | A kind of city colonies based on mobile communication operators data behavior monitoring system |
CN107231545A (en) * | 2017-06-22 | 2017-10-03 | 北京工商大学 | A kind of method of the monitoring remote video based on smart mobile phone |
CN107967663A (en) * | 2017-12-11 | 2018-04-27 | 西安立东行智能技术有限公司 | A kind of region of deploying to ensure effective monitoring and control of illegal activities prevents the unauthorized automatic alarm system and method swarmed into |
CN108333584A (en) * | 2017-12-28 | 2018-07-27 | 陕西弘毅军民融合智能科技有限公司 | A kind of remote unmanned plane detection system of low altitude small target and detection method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112258718A (en) * | 2020-09-27 | 2021-01-22 | 中国建设银行股份有限公司 | Human body temperature measurement and personnel identification method and system |
CN116033070A (en) * | 2021-10-27 | 2023-04-28 | 中移(杭州)信息技术有限公司 | Alarm method and device based on signal detection and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11929870B2 (en) | Correlation engine for correlating sensory events | |
CN109858365B (en) | Special crowd gathering behavior analysis method and device and electronic equipment | |
US7595815B2 (en) | Apparatus, methods, and systems for intelligent security and safety | |
KR101297295B1 (en) | Security control system by face recognition | |
US7847820B2 (en) | Intelligent event determination and notification in a surveillance system | |
US8730040B2 (en) | Systems, methods, and apparatus for monitoring and alerting on large sensory data sets for improved safety, security, and business productivity | |
CN103384321B (en) | The system and method for rear event/alert analysis in CCTV and Integrative security system | |
CN111612113A (en) | Epidemic prevention control method, device, system, storage medium and processor | |
CN109191761A (en) | A kind of method for recognizing fire disaster based on flame multiple features fusion | |
CN108073577A (en) | A kind of alarm method and system based on recognition of face | |
CN106780250B (en) | Intelligent community security event processing method and system based on Internet of things technology | |
TW200530805A (en) | Database user behavior monitor system and method | |
Bauman et al. | Using social sensors for detecting emergency events: a case of power outages in the electrical utility industry | |
KR20180118979A (en) | Method and apparatus for risk detection, prediction, and its correspondence for public safety based on multiple complex information | |
CN113178050B (en) | Smart community management system | |
CN115966313B (en) | Integrated management platform based on face recognition | |
CN109218669A (en) | A kind of intelligent video monitoring linkage mobile phone detection alarm method | |
KR102084687B1 (en) | Security operation service method and system for detecting illegal photography | |
CN109120896B (en) | Security video monitoring guard system | |
US8344878B2 (en) | Method and apparatus for the creation of an event-associated electronic device directory | |
CN111400415A (en) | Management method and related device for stability-related personnel | |
CN210983509U (en) | Entry key group distribution and control system | |
CN105453149A (en) | Crime evidence provider cum help seeker | |
Mahmood Ali et al. | Strategies and tools for effective suspicious event detection from video: a survey perspective (COVID-19) | |
Khot Harish et al. | Smart video surveillance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190115 |
|
WD01 | Invention patent application deemed withdrawn after publication |