CN109472966B - Security alarm method and security system by using internet information - Google Patents

Security alarm method and security system by using internet information Download PDF

Info

Publication number
CN109472966B
CN109472966B CN201811554322.5A CN201811554322A CN109472966B CN 109472966 B CN109472966 B CN 109472966B CN 201811554322 A CN201811554322 A CN 201811554322A CN 109472966 B CN109472966 B CN 109472966B
Authority
CN
China
Prior art keywords
information
security
accident
alarm
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201811554322.5A
Other languages
Chinese (zh)
Other versions
CN109472966A (en
Inventor
张宸豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Police College
Original Assignee
Zhejiang Police College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Police College filed Critical Zhejiang Police College
Priority to CN201811554322.5A priority Critical patent/CN109472966B/en
Publication of CN109472966A publication Critical patent/CN109472966A/en
Application granted granted Critical
Publication of CN109472966B publication Critical patent/CN109472966B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B17/00Fire alarms; Alarms responsive to explosion
    • G08B17/12Actuation by presence of radiation or particles, e.g. of infrared radiation or of ions
    • G08B17/125Actuation by presence of radiation or particles, e.g. of infrared radiation or of ions by using a video camera to detect fire or smoke
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The invention is a security alarm method and security system utilizing Internet information, it utilizes Internet to receive, monitor, analyze and verify the data flow from news feed, network service and social media, in order to warn and coordinate the possible terrorist incident, major crime, initiative shooting, public anti-conference and other sudden events of the security service organization, through using including computer hardware, computer storage and database, etc. to gather, process and process the Internet safety warning information, and will be accurate information transfer to the security service personnel immediately, can call the historical event handling way according to the file when the high threatening incident happens, have strengthened the intellectualization of the security alarm system while further raising the efficiency; client matching is carried out on the high-threat events, different response actions are taken aiming at different clients, and the humanization of the security system is improved.

Description

Security alarm method and security system by using internet information
Technical Field
The invention relates to the technical field of information security, in particular to a security alarm method and a security system by utilizing internet information.
Background
With the frequent occurrence of accidents, such as armed robbery, terrorist attack, street harassment, fire, or other major events threatening the country, people, society and economy, increasingly high requirements are put forward on the accurate acquisition of information by national security guards. Besides acquiring the alarm of the accident in the first time, security personnel need to distinguish the true and false of the accident in time, know and manage the basic situation, the danger degree and the social influence of the accident, so as to respond correctly and prevent the further spread and impact of the accident. In the existing safety protection system, on-site safety personnel and first responders cannot immediately obtain accurate, verified and timely information, and the deployment, control and coordination personnel grasp and deploy the on-site conditions, so that event delay exists. Therefore, when an accident happens, the main problems of the existing security system are that information transmission is not timely and accurate, and strain response is not sensitive and rapid.
Disclosure of Invention
The present invention is a method of using the internet to receive, monitor, analyze and validate data streams from news feeds, web services and social media to warn and coordinate possible terrorist events, major crimes, active fire, public outings and other emergencies with security services. The method provides for the collection, processing and processing of internet security alert information using hardware including computer hardware, computer storage and databases, and the immediate delivery of accurate information to security service personnel.
The invention aims to grade safety alarm information through a database by depending on an internet platform, and different processing modes are adopted for accidents with different threat grades so as to improve the security efficiency and save public resources.
In order to achieve the aim, the invention adopts the following technical scheme:
a security alarm method using Internet information, the Internet information includes Internet information system, the system collects security information by using broadcast news, online news, social media and other Internet approaches, security personnel screen the information and send the information to related personnel for reminding and coordinating site security personnel and first responders; the method is characterized in that: the internet information system includes internet-connected computer hardware, a computer memory connected to the computer hardware, a communication device connected to and integrated with the computer hardware, and information management software having a data structure stored in the computer memory and running on the computer hardware for input, organization, and management; the internet information system includes information relating to an incident; the internet information system includes a client database of client information, such as information about client locations and client security assets; the internet information system includes a database of incident information, such as incident location, incident type, response action;
the security alarm method comprises the following steps:
a) obtaining incident alerts by mining broadcast news, cable and online news services, and social media websites; b) inputting the incident alert information into the information management software such that each of the incident alerts is discriminable; c) determining the threat level of each accident alarm by extracting the accident alarm keywords, and performing corresponding action on the client according to the threat level; d) when the threat level is low, the system is an invalid accident alarm, ignores the invalid accident alarm and deletes relevant information; e) if the threat level is middle, the alarm is a general accident alarm, and step k) is directly executed; creating event profiles in a database of incident information for each of the active incident alarms when the threat level is high; f) adding all clients affected by the valid contingency to each of the event profiles; g) matching response actions to the unexpected events for each client according to the influenced degree of the client in the event file; h) the security personnel generate a safety alarm notice from the event file generated in the step g) and transmit the safety alarm notice to the client and field safety personnel; j) determining a threshold value of a comprehensive threat response, and determining a first responder according to the threshold value; k) starting a comprehensive threat response, and eliminating the threat by using a distributed security motor vehicle management system, wherein the distributed security motor vehicle management system receives accident event information such as event position, event type and response action and coordinates security personnel to perform accident handling; and l) after the response action is finished, reporting and archiving the response effect, establishing an accident data set on the information management software, and extracting keywords in the data set and putting the keywords in the data set into a database of the accident information so as to improve the matching degree of the accident alarm and the client.
Preferably, the original data source of the database of the accident information is a major traffic accident, a major fire accident, a gunshot accident, a major robbery accident, and the like.
Preferably, the database data source of the accident information further includes continuously updated accident information reported in the step I).
Preferably, the threshold value corresponding to the synthetic threat determined in step j) comprises a parameter related to the security of the client's lives and properties.
Preferably, the first responder in the step j) comprises a public security system, a fire protection system, an emergency system and the like.
Preferably, the responsive action may comprise using an unmanned aerial device.
Preferably, the unmanned aerial vehicle device includes camera system, face identification system, long-range call system and emergency processing system etc..
Preferably, the face recognition system is provided with an AI intelligent processing center, and can rapidly identify the dangerous molecules with crime records in the crowd.
Preferably, the remote call system has a remote control device, wherein the remote control device transmits voice to the drone device end through 433M radio.
In addition, the invention protects a security alarm system using internet information, the system uses the security alarm method of the invention, and the system uses a mobile device end to broadcast and spread the security alarm information in real time.
Compared with the prior art, the method has the advantages that the accident alarm is obtained in the maximum extent range by widely mining broadcast news, online news service and social media websites; through two evaluation processes, the threat level is evaluated into a low gear, a medium gear and a high gear, and different response actions are taken according to different gears, so that the response accuracy can be improved, and social resources are saved; setting a database for accidents with threat level of high gear, setting an event file in the database, and calling a historical event processing mode according to the file when a high-threat event occurs, thereby further improving the efficiency and strengthening the intelligence of a safety alarm system; client matching is carried out on the high-threat events, different response actions are taken aiming at different clients, and the humanization of the security system is improved.
Drawings
FIG. 1 is a flow chart of a method of security alarm
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings and embodiments, it being understood that the specific embodiments described herein are merely illustrative of the present invention and are not intended to limit the present invention.
The internet information system in the present invention includes internet-connected computer hardware, a computer memory connected to the computer hardware, a communication device connected to and integrated with the computer hardware, and information management software having a data structure stored in the computer memory and running on the computer hardware for input, organization and management.
The Internet information system comprises information related to accidents, wherein the original data source of a database of the accident information is a major traffic accident, a major fire accident, a gunshot accident, a major robbery accident and the like; the database data source of the accident information also comprises the accident information reported in the continuous updating process.
The internet information system of the present invention includes a client database of client information, such as information about client location and client security assets; the internet information system includes a database of incident information such as incident location, incident type, response action.
Fig. 1 illustrates a security alarm method using internet information including an internet information system for security information collection by using broadcast news, online news, social media, and other internet approaches.
S01, the security personnel screen the information and send the information to the related personnel for reminding and coordinating the site security personnel and the first responder in the subsequent operation; obtaining incident alerts by mining broadcast news, cable and online news services, and social media websites; social software such as a circle of friends, a microblog, a fast hand, a tremble, a volcano small video and the like identifies suspicious events: fire, robbery, murder, riot, etc.;
inputting incident alarm information into the information management software so that each incident alarm obtains discriminatability;
s02, evaluating the threat level of each accident alarm by extracting the accident alarm keywords, and performing corresponding actions on the client according to the threat level:
if the threat level is low, the system is an invalid accident alarm, ignores the invalid accident alarm, and deletes relevant information, such as false alarm information and the like;
s03, re-evaluating the non-invalid accident alarm, if the threat level is middle, the alarm is a common accident alarm, such as common civil dispute, non-major fire and the like, and directly executing the step S09;
if the threat level is high, an active incident alert is issued, executing the next step;
s04, creating an event profile in a database of incident information for each valid incident alarm;
s05, adding all clients affected by the effective accident event to each event profile;
s06, matching response actions to the unexpected events for each client according to the influenced degree of the client in the event file;
s07, security personnel generate a safety alarm notice from the event file generated in the step g) and transmit the safety alarm notice to a client and field safety personnel;
and S08, determining a threshold value of the comprehensive threat response, and determining a first responder according to the threshold value. Wherein determining the threshold value corresponding to the composite threat comprises a parameter related to the security of the client's lives and properties; the first responder comprises a public security system, a fire fighting system, an emergency system and the like. And the response action may include using a drone device including a camera system, a face recognition system, a remote call system, an emergency processing system, and the like. The face recognition system is provided with an AI intelligent processing center and can rapidly recognize dangerous molecules with crime records in the crowd; the remote call system is provided with a remote control device, wherein the remote control device transmits voice to the unmanned aerial vehicle device end through 433M radio.
S09, starting a comprehensive threat response, and eliminating the threat by using a distributed security motor vehicle management system, wherein the distributed security motor vehicle management system receives accident event information such as event position, event type and response action, coordinates security personnel to perform accident handling, can distribute and patrol security personnel according to a planned area at fixed points, and sends an instruction to the patrol vehicle according to time position so as to rapidly reach a specified position to handle emergency;
and S10, after the response action is finished, reporting and archiving the response effect, establishing an accident data set on the information management software, and extracting and placing keywords in the data set into a database of the accident information to improve the matching degree of the accident alarm and the client.
The invention also discloses a security alarm system using the internet information, which uses the alarm method and uses the mobile equipment terminal to broadcast and propagate the security alarm information in real time.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the invention is not limited to the embodiments disclosed, but is capable of numerous equivalents and substitutions, all of which are within the scope of the invention as defined by the appended claims.

Claims (2)

1. A security alarm method using Internet information, the method uses Internet information system, the system collects security information by using broadcast news, online news and social media, security personnel filter the information and send the information to related personnel to remind and coordinate on-site security personnel and first responders, characterized in that: the internet information system includes internet-connected computer hardware, a computer memory connected to the computer hardware, a communication device connected to and integrated with the computer hardware, and information management software having a data structure stored in the computer memory and running on the computer hardware for input, organization, and management; the internet information system includes information relating to an incident; the internet information system comprises a client database of client information, wherein the client database stores information about client positions and client security assets; the Internet information system comprises a database of accident information, wherein the database of the accident information stores an event position, an event type and a response action; the security alarm method comprises the following steps: a) obtaining incident alerts by mining broadcast news, online news services, and social media websites; b) inputting the incident alert information into the information management software such that each of the incident alerts is discriminable; c) determining the threat level of each accident alarm by extracting the accident alarm keywords, and performing corresponding action on the client according to the threat level; d) when the threat level is low, the system is an invalid accident alarm, ignores the invalid accident alarm and deletes relevant information; e) if the threat level is middle, the alarm is a general accident alarm, and step k) is directly executed; creating event profiles in a database of incident information for each of the active incident alarms when the threat level is high; f) adding all clients affected by the active contingency alert to each of the event profiles; g) matching response actions to the unexpected events for each client according to the influenced degree of the client in the event file; h) the security personnel generate a safety alarm notice from the event file generated in the step g) and transmit the safety alarm notice to the client and field safety personnel; j) determining a threshold value of a comprehensive threat response, and determining a first responder according to the threshold value; k) starting a comprehensive threat response, and utilizing a distributed security motor vehicle management system to eliminate the threat, wherein the distributed security motor vehicle management system receives accident event information, the accident event information comprises an event position, an event type and a response action, and coordinates security personnel to perform accident handling; l) after the response action is finished, establishing an accident data set on the information management software, extracting keywords in the effective accident, and putting the keywords into a database of the accident information to improve the matching degree of the effective accident alarm and the client, wherein the original data sources of the database of the accident information are major traffic accidents, major fire accidents, gunshot accidents and major robbery accidents which occur, the database data sources of the accident information also comprise the accident information reported in the step l) which is continuously updated, the threshold corresponding to the comprehensive threat determined in the step j) comprises parameters related to the security of the life and property of the client, the first responder in the step j) comprises a public security system, a fire-fighting system and an emergency system, the response action comprises using an unmanned aerial vehicle device, and the unmanned aerial vehicle device comprises a camera system, Face identification system, long-range conversation system and urgent processing system, face identification system has AI intelligent processing center, can discern the dangerous molecule that has the crime record in the crowd rapidly, long-range conversation system has remote control unit, and wherein remote control unit passes through 433M radio transmission pronunciation extremely unmanned aerial vehicle device end.
2. A security alarm system using Internet information, the system uses the method as claimed in claim 1, characterized in that the system uses a mobile device end to broadcast and propagate the security alarm information in real time.
CN201811554322.5A 2018-12-19 2018-12-19 Security alarm method and security system by using internet information Expired - Fee Related CN109472966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811554322.5A CN109472966B (en) 2018-12-19 2018-12-19 Security alarm method and security system by using internet information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811554322.5A CN109472966B (en) 2018-12-19 2018-12-19 Security alarm method and security system by using internet information

Publications (2)

Publication Number Publication Date
CN109472966A CN109472966A (en) 2019-03-15
CN109472966B true CN109472966B (en) 2020-05-22

Family

ID=65676391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811554322.5A Expired - Fee Related CN109472966B (en) 2018-12-19 2018-12-19 Security alarm method and security system by using internet information

Country Status (1)

Country Link
CN (1) CN109472966B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210651B (en) * 2019-05-09 2021-07-06 四川九洲电器集团有限责任公司 Intelligent security method and device, computer storage medium and electronic equipment
CN110956790A (en) * 2019-12-24 2020-04-03 深圳市凯木金科技有限公司 Alarm method based on automobile data recorder and automobile data recorder
CN113031529B (en) * 2021-03-17 2024-06-21 张宸豪 Intelligent control method and system for buckling machine

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7259694B2 (en) * 2001-02-26 2007-08-21 International Business Machines Corporation Wireless communication system and method to provide geo-spatial related event data
US9135808B2 (en) * 2012-12-18 2015-09-15 James Vincent Petrizzi Systems, devices and methods to communicate public safety information
CN106355805A (en) * 2016-11-10 2017-01-25 广东容祺智能科技有限公司 Big data substation monitoring system based on unmanned aerial vehicle and detection method thereof
CN107909238A (en) * 2017-10-09 2018-04-13 中国电子科技集团公司第二十八研究所 A kind of city collaboration processing and interlinked command system and command hall

Also Published As

Publication number Publication date
CN109472966A (en) 2019-03-15

Similar Documents

Publication Publication Date Title
CN109472966B (en) Security alarm method and security system by using internet information
US8368754B2 (en) Video pattern recognition for automating emergency service incident awareness and response
CN109598885B (en) Monitoring system and alarm method thereof
US11302176B2 (en) Real time municipal imminent danger warning system
CN1148710C (en) Monitoring system
US10008102B1 (en) System and method for monitoring radio-frequency (RF) signals for security applications
CN109872482A (en) Wisdom security protection monitoring and managing method, system and storage medium
CN108038808A (en) A kind of monitoring method, device, terminal device and storage medium
CN109935042A (en) A kind of harbour dangerous material intelligent monitoring early warning system
CN103578240A (en) Security and protection service network based on Internet of Things
CN110245630A (en) Monitoring data processing method, device and readable storage medium storing program for executing
WO2017143260A1 (en) Community security system
CN107958562A (en) A kind of household safe Active Defending System Against and method
CN104967819A (en) Security early warning system and security early warning method based on MAC address collection management
CN108198373A (en) A kind of safety-protection system applied to cell management
CN110867046A (en) Intelligent car washer video monitoring and early warning system based on cloud computing
CN111815831A (en) Intelligent community security system based on Internet of things
CN101127143A (en) Automatic tracking display system for warn
CN105006089A (en) Safety monitoring alarm method and system based on images
CN102143431A (en) Method, system and mobile terminal for alarming
CN104064026A (en) Taxi safety monitoring system and method capable of monitoring dangerous goods and alert situations
CN111539862B (en) Emergency processing method and device based on individual dispatch and computer equipment
CN110996300A (en) Vehicle-mounted terminal information safety risk control method based on traffic scene safety
CN112580470A (en) City visual perception method and device, electronic equipment and storage medium
US11600166B1 (en) Occurrence-record driven monitoring system and method of use thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200522

Termination date: 20211219

CF01 Termination of patent right due to non-payment of annual fee