CN109472966B - Security alarm method and security system by using internet information - Google Patents
Security alarm method and security system by using internet information Download PDFInfo
- Publication number
- CN109472966B CN109472966B CN201811554322.5A CN201811554322A CN109472966B CN 109472966 B CN109472966 B CN 109472966B CN 201811554322 A CN201811554322 A CN 201811554322A CN 109472966 B CN109472966 B CN 109472966B
- Authority
- CN
- China
- Prior art keywords
- information
- security
- accident
- alarm
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000004044 response Effects 0.000 claims abstract description 27
- 230000009471 action Effects 0.000 claims abstract description 18
- 230000008520 organization Effects 0.000 claims abstract description 4
- 238000012545 processing Methods 0.000 claims description 7
- 230000000875 corresponding effect Effects 0.000 claims description 6
- YTAHJIFKAKIKAV-XNMGPUDCSA-N [(1R)-3-morpholin-4-yl-1-phenylpropyl] N-[(3S)-2-oxo-5-phenyl-1,3-dihydro-1,4-benzodiazepin-3-yl]carbamate Chemical compound O=C1[C@H](N=C(C2=C(N1)C=CC=C2)C1=CC=CC=C1)NC(O[C@H](CCN1CCOCC1)C1=CC=CC=C1)=O YTAHJIFKAKIKAV-XNMGPUDCSA-N 0.000 claims description 4
- 238000005065 mining Methods 0.000 claims description 4
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 claims description 3
- 206010000369 Accident Diseases 0.000 claims description 3
- 206010039203 Road traffic accident Diseases 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 abstract description 3
- 206010063385 Intellectualisation Diseases 0.000 abstract 1
- 238000007726 management method Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 206010044565 Tremor Diseases 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000012854 evaluation process Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- CCEKAJIANROZEO-UHFFFAOYSA-N sulfluramid Chemical group CCNS(=O)(=O)C(F)(F)C(F)(F)C(F)(F)C(F)(F)C(F)(F)C(F)(F)C(F)(F)C(F)(F)F CCEKAJIANROZEO-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/182—Level alarms, e.g. alarms responsive to variables exceeding a threshold
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B17/00—Fire alarms; Alarms responsive to explosion
- G08B17/12—Actuation by presence of radiation or particles, e.g. of infrared radiation or of ions
- G08B17/125—Actuation by presence of radiation or particles, e.g. of infrared radiation or of ions by using a video camera to detect fire or smoke
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
The invention is a security alarm method and security system utilizing Internet information, it utilizes Internet to receive, monitor, analyze and verify the data flow from news feed, network service and social media, in order to warn and coordinate the possible terrorist incident, major crime, initiative shooting, public anti-conference and other sudden events of the security service organization, through using including computer hardware, computer storage and database, etc. to gather, process and process the Internet safety warning information, and will be accurate information transfer to the security service personnel immediately, can call the historical event handling way according to the file when the high threatening incident happens, have strengthened the intellectualization of the security alarm system while further raising the efficiency; client matching is carried out on the high-threat events, different response actions are taken aiming at different clients, and the humanization of the security system is improved.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a security alarm method and a security system by utilizing internet information.
Background
With the frequent occurrence of accidents, such as armed robbery, terrorist attack, street harassment, fire, or other major events threatening the country, people, society and economy, increasingly high requirements are put forward on the accurate acquisition of information by national security guards. Besides acquiring the alarm of the accident in the first time, security personnel need to distinguish the true and false of the accident in time, know and manage the basic situation, the danger degree and the social influence of the accident, so as to respond correctly and prevent the further spread and impact of the accident. In the existing safety protection system, on-site safety personnel and first responders cannot immediately obtain accurate, verified and timely information, and the deployment, control and coordination personnel grasp and deploy the on-site conditions, so that event delay exists. Therefore, when an accident happens, the main problems of the existing security system are that information transmission is not timely and accurate, and strain response is not sensitive and rapid.
Disclosure of Invention
The present invention is a method of using the internet to receive, monitor, analyze and validate data streams from news feeds, web services and social media to warn and coordinate possible terrorist events, major crimes, active fire, public outings and other emergencies with security services. The method provides for the collection, processing and processing of internet security alert information using hardware including computer hardware, computer storage and databases, and the immediate delivery of accurate information to security service personnel.
The invention aims to grade safety alarm information through a database by depending on an internet platform, and different processing modes are adopted for accidents with different threat grades so as to improve the security efficiency and save public resources.
In order to achieve the aim, the invention adopts the following technical scheme:
a security alarm method using Internet information, the Internet information includes Internet information system, the system collects security information by using broadcast news, online news, social media and other Internet approaches, security personnel screen the information and send the information to related personnel for reminding and coordinating site security personnel and first responders; the method is characterized in that: the internet information system includes internet-connected computer hardware, a computer memory connected to the computer hardware, a communication device connected to and integrated with the computer hardware, and information management software having a data structure stored in the computer memory and running on the computer hardware for input, organization, and management; the internet information system includes information relating to an incident; the internet information system includes a client database of client information, such as information about client locations and client security assets; the internet information system includes a database of incident information, such as incident location, incident type, response action;
the security alarm method comprises the following steps:
a) obtaining incident alerts by mining broadcast news, cable and online news services, and social media websites; b) inputting the incident alert information into the information management software such that each of the incident alerts is discriminable; c) determining the threat level of each accident alarm by extracting the accident alarm keywords, and performing corresponding action on the client according to the threat level; d) when the threat level is low, the system is an invalid accident alarm, ignores the invalid accident alarm and deletes relevant information; e) if the threat level is middle, the alarm is a general accident alarm, and step k) is directly executed; creating event profiles in a database of incident information for each of the active incident alarms when the threat level is high; f) adding all clients affected by the valid contingency to each of the event profiles; g) matching response actions to the unexpected events for each client according to the influenced degree of the client in the event file; h) the security personnel generate a safety alarm notice from the event file generated in the step g) and transmit the safety alarm notice to the client and field safety personnel; j) determining a threshold value of a comprehensive threat response, and determining a first responder according to the threshold value; k) starting a comprehensive threat response, and eliminating the threat by using a distributed security motor vehicle management system, wherein the distributed security motor vehicle management system receives accident event information such as event position, event type and response action and coordinates security personnel to perform accident handling; and l) after the response action is finished, reporting and archiving the response effect, establishing an accident data set on the information management software, and extracting keywords in the data set and putting the keywords in the data set into a database of the accident information so as to improve the matching degree of the accident alarm and the client.
Preferably, the original data source of the database of the accident information is a major traffic accident, a major fire accident, a gunshot accident, a major robbery accident, and the like.
Preferably, the database data source of the accident information further includes continuously updated accident information reported in the step I).
Preferably, the threshold value corresponding to the synthetic threat determined in step j) comprises a parameter related to the security of the client's lives and properties.
Preferably, the first responder in the step j) comprises a public security system, a fire protection system, an emergency system and the like.
Preferably, the responsive action may comprise using an unmanned aerial device.
Preferably, the unmanned aerial vehicle device includes camera system, face identification system, long-range call system and emergency processing system etc..
Preferably, the face recognition system is provided with an AI intelligent processing center, and can rapidly identify the dangerous molecules with crime records in the crowd.
Preferably, the remote call system has a remote control device, wherein the remote control device transmits voice to the drone device end through 433M radio.
In addition, the invention protects a security alarm system using internet information, the system uses the security alarm method of the invention, and the system uses a mobile device end to broadcast and spread the security alarm information in real time.
Compared with the prior art, the method has the advantages that the accident alarm is obtained in the maximum extent range by widely mining broadcast news, online news service and social media websites; through two evaluation processes, the threat level is evaluated into a low gear, a medium gear and a high gear, and different response actions are taken according to different gears, so that the response accuracy can be improved, and social resources are saved; setting a database for accidents with threat level of high gear, setting an event file in the database, and calling a historical event processing mode according to the file when a high-threat event occurs, thereby further improving the efficiency and strengthening the intelligence of a safety alarm system; client matching is carried out on the high-threat events, different response actions are taken aiming at different clients, and the humanization of the security system is improved.
Drawings
FIG. 1 is a flow chart of a method of security alarm
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings and embodiments, it being understood that the specific embodiments described herein are merely illustrative of the present invention and are not intended to limit the present invention.
The internet information system in the present invention includes internet-connected computer hardware, a computer memory connected to the computer hardware, a communication device connected to and integrated with the computer hardware, and information management software having a data structure stored in the computer memory and running on the computer hardware for input, organization and management.
The Internet information system comprises information related to accidents, wherein the original data source of a database of the accident information is a major traffic accident, a major fire accident, a gunshot accident, a major robbery accident and the like; the database data source of the accident information also comprises the accident information reported in the continuous updating process.
The internet information system of the present invention includes a client database of client information, such as information about client location and client security assets; the internet information system includes a database of incident information such as incident location, incident type, response action.
Fig. 1 illustrates a security alarm method using internet information including an internet information system for security information collection by using broadcast news, online news, social media, and other internet approaches.
S01, the security personnel screen the information and send the information to the related personnel for reminding and coordinating the site security personnel and the first responder in the subsequent operation; obtaining incident alerts by mining broadcast news, cable and online news services, and social media websites; social software such as a circle of friends, a microblog, a fast hand, a tremble, a volcano small video and the like identifies suspicious events: fire, robbery, murder, riot, etc.;
inputting incident alarm information into the information management software so that each incident alarm obtains discriminatability;
s02, evaluating the threat level of each accident alarm by extracting the accident alarm keywords, and performing corresponding actions on the client according to the threat level:
if the threat level is low, the system is an invalid accident alarm, ignores the invalid accident alarm, and deletes relevant information, such as false alarm information and the like;
s03, re-evaluating the non-invalid accident alarm, if the threat level is middle, the alarm is a common accident alarm, such as common civil dispute, non-major fire and the like, and directly executing the step S09;
if the threat level is high, an active incident alert is issued, executing the next step;
s04, creating an event profile in a database of incident information for each valid incident alarm;
s05, adding all clients affected by the effective accident event to each event profile;
s06, matching response actions to the unexpected events for each client according to the influenced degree of the client in the event file;
s07, security personnel generate a safety alarm notice from the event file generated in the step g) and transmit the safety alarm notice to a client and field safety personnel;
and S08, determining a threshold value of the comprehensive threat response, and determining a first responder according to the threshold value. Wherein determining the threshold value corresponding to the composite threat comprises a parameter related to the security of the client's lives and properties; the first responder comprises a public security system, a fire fighting system, an emergency system and the like. And the response action may include using a drone device including a camera system, a face recognition system, a remote call system, an emergency processing system, and the like. The face recognition system is provided with an AI intelligent processing center and can rapidly recognize dangerous molecules with crime records in the crowd; the remote call system is provided with a remote control device, wherein the remote control device transmits voice to the unmanned aerial vehicle device end through 433M radio.
S09, starting a comprehensive threat response, and eliminating the threat by using a distributed security motor vehicle management system, wherein the distributed security motor vehicle management system receives accident event information such as event position, event type and response action, coordinates security personnel to perform accident handling, can distribute and patrol security personnel according to a planned area at fixed points, and sends an instruction to the patrol vehicle according to time position so as to rapidly reach a specified position to handle emergency;
and S10, after the response action is finished, reporting and archiving the response effect, establishing an accident data set on the information management software, and extracting and placing keywords in the data set into a database of the accident information to improve the matching degree of the accident alarm and the client.
The invention also discloses a security alarm system using the internet information, which uses the alarm method and uses the mobile equipment terminal to broadcast and propagate the security alarm information in real time.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the invention is not limited to the embodiments disclosed, but is capable of numerous equivalents and substitutions, all of which are within the scope of the invention as defined by the appended claims.
Claims (2)
1. A security alarm method using Internet information, the method uses Internet information system, the system collects security information by using broadcast news, online news and social media, security personnel filter the information and send the information to related personnel to remind and coordinate on-site security personnel and first responders, characterized in that: the internet information system includes internet-connected computer hardware, a computer memory connected to the computer hardware, a communication device connected to and integrated with the computer hardware, and information management software having a data structure stored in the computer memory and running on the computer hardware for input, organization, and management; the internet information system includes information relating to an incident; the internet information system comprises a client database of client information, wherein the client database stores information about client positions and client security assets; the Internet information system comprises a database of accident information, wherein the database of the accident information stores an event position, an event type and a response action; the security alarm method comprises the following steps: a) obtaining incident alerts by mining broadcast news, online news services, and social media websites; b) inputting the incident alert information into the information management software such that each of the incident alerts is discriminable; c) determining the threat level of each accident alarm by extracting the accident alarm keywords, and performing corresponding action on the client according to the threat level; d) when the threat level is low, the system is an invalid accident alarm, ignores the invalid accident alarm and deletes relevant information; e) if the threat level is middle, the alarm is a general accident alarm, and step k) is directly executed; creating event profiles in a database of incident information for each of the active incident alarms when the threat level is high; f) adding all clients affected by the active contingency alert to each of the event profiles; g) matching response actions to the unexpected events for each client according to the influenced degree of the client in the event file; h) the security personnel generate a safety alarm notice from the event file generated in the step g) and transmit the safety alarm notice to the client and field safety personnel; j) determining a threshold value of a comprehensive threat response, and determining a first responder according to the threshold value; k) starting a comprehensive threat response, and utilizing a distributed security motor vehicle management system to eliminate the threat, wherein the distributed security motor vehicle management system receives accident event information, the accident event information comprises an event position, an event type and a response action, and coordinates security personnel to perform accident handling; l) after the response action is finished, establishing an accident data set on the information management software, extracting keywords in the effective accident, and putting the keywords into a database of the accident information to improve the matching degree of the effective accident alarm and the client, wherein the original data sources of the database of the accident information are major traffic accidents, major fire accidents, gunshot accidents and major robbery accidents which occur, the database data sources of the accident information also comprise the accident information reported in the step l) which is continuously updated, the threshold corresponding to the comprehensive threat determined in the step j) comprises parameters related to the security of the life and property of the client, the first responder in the step j) comprises a public security system, a fire-fighting system and an emergency system, the response action comprises using an unmanned aerial vehicle device, and the unmanned aerial vehicle device comprises a camera system, Face identification system, long-range conversation system and urgent processing system, face identification system has AI intelligent processing center, can discern the dangerous molecule that has the crime record in the crowd rapidly, long-range conversation system has remote control unit, and wherein remote control unit passes through 433M radio transmission pronunciation extremely unmanned aerial vehicle device end.
2. A security alarm system using Internet information, the system uses the method as claimed in claim 1, characterized in that the system uses a mobile device end to broadcast and propagate the security alarm information in real time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811554322.5A CN109472966B (en) | 2018-12-19 | 2018-12-19 | Security alarm method and security system by using internet information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811554322.5A CN109472966B (en) | 2018-12-19 | 2018-12-19 | Security alarm method and security system by using internet information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109472966A CN109472966A (en) | 2019-03-15 |
CN109472966B true CN109472966B (en) | 2020-05-22 |
Family
ID=65676391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811554322.5A Expired - Fee Related CN109472966B (en) | 2018-12-19 | 2018-12-19 | Security alarm method and security system by using internet information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109472966B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210651B (en) * | 2019-05-09 | 2021-07-06 | 四川九洲电器集团有限责任公司 | Intelligent security method and device, computer storage medium and electronic equipment |
CN110956790A (en) * | 2019-12-24 | 2020-04-03 | 深圳市凯木金科技有限公司 | Alarm method based on automobile data recorder and automobile data recorder |
CN113031529B (en) * | 2021-03-17 | 2024-06-21 | 张宸豪 | Intelligent control method and system for buckling machine |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7259694B2 (en) * | 2001-02-26 | 2007-08-21 | International Business Machines Corporation | Wireless communication system and method to provide geo-spatial related event data |
US9135808B2 (en) * | 2012-12-18 | 2015-09-15 | James Vincent Petrizzi | Systems, devices and methods to communicate public safety information |
CN106355805A (en) * | 2016-11-10 | 2017-01-25 | 广东容祺智能科技有限公司 | Big data substation monitoring system based on unmanned aerial vehicle and detection method thereof |
CN107909238A (en) * | 2017-10-09 | 2018-04-13 | 中国电子科技集团公司第二十八研究所 | A kind of city collaboration processing and interlinked command system and command hall |
-
2018
- 2018-12-19 CN CN201811554322.5A patent/CN109472966B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN109472966A (en) | 2019-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109472966B (en) | Security alarm method and security system by using internet information | |
US8368754B2 (en) | Video pattern recognition for automating emergency service incident awareness and response | |
CN109598885B (en) | Monitoring system and alarm method thereof | |
US11302176B2 (en) | Real time municipal imminent danger warning system | |
CN1148710C (en) | Monitoring system | |
US10008102B1 (en) | System and method for monitoring radio-frequency (RF) signals for security applications | |
CN109872482A (en) | Wisdom security protection monitoring and managing method, system and storage medium | |
CN108038808A (en) | A kind of monitoring method, device, terminal device and storage medium | |
CN109935042A (en) | A kind of harbour dangerous material intelligent monitoring early warning system | |
CN103578240A (en) | Security and protection service network based on Internet of Things | |
CN110245630A (en) | Monitoring data processing method, device and readable storage medium storing program for executing | |
WO2017143260A1 (en) | Community security system | |
CN107958562A (en) | A kind of household safe Active Defending System Against and method | |
CN104967819A (en) | Security early warning system and security early warning method based on MAC address collection management | |
CN108198373A (en) | A kind of safety-protection system applied to cell management | |
CN110867046A (en) | Intelligent car washer video monitoring and early warning system based on cloud computing | |
CN111815831A (en) | Intelligent community security system based on Internet of things | |
CN101127143A (en) | Automatic tracking display system for warn | |
CN105006089A (en) | Safety monitoring alarm method and system based on images | |
CN102143431A (en) | Method, system and mobile terminal for alarming | |
CN104064026A (en) | Taxi safety monitoring system and method capable of monitoring dangerous goods and alert situations | |
CN111539862B (en) | Emergency processing method and device based on individual dispatch and computer equipment | |
CN110996300A (en) | Vehicle-mounted terminal information safety risk control method based on traffic scene safety | |
CN112580470A (en) | City visual perception method and device, electronic equipment and storage medium | |
US11600166B1 (en) | Occurrence-record driven monitoring system and method of use thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200522 Termination date: 20211219 |
|
CF01 | Termination of patent right due to non-payment of annual fee |