CN109658648A - Monitoring method, device and the system of boundary defence - Google Patents

Monitoring method, device and the system of boundary defence Download PDF

Info

Publication number
CN109658648A
CN109658648A CN201910045715.1A CN201910045715A CN109658648A CN 109658648 A CN109658648 A CN 109658648A CN 201910045715 A CN201910045715 A CN 201910045715A CN 109658648 A CN109658648 A CN 109658648A
Authority
CN
China
Prior art keywords
detection device
image
exception information
detection
fence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910045715.1A
Other languages
Chinese (zh)
Inventor
赵辉
姚程
王辰晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhiming Technology Co Ltd
Original Assignee
Shanghai Zhiming Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhiming Technology Co Ltd filed Critical Shanghai Zhiming Technology Co Ltd
Priority to CN201910045715.1A priority Critical patent/CN109658648A/en
Publication of CN109658648A publication Critical patent/CN109658648A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • G08B13/124Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence with the breaking or disturbance being optically detected, e.g. optical fibers in the perimeter fence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/19Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation

Abstract

The present invention provides a kind of monitoring method of boundary defence, device and system, the system, including monitoring device, multiple detection devices and multiple images acquisition device;The detection device sends the exception information for generating exception information when detecting that circumference invades, and to the monitoring device;The monitoring device, for receiving the exception information of at least one of N number of detection device detection device transmission, according to the exception information, at least one described corresponding M image collecting device of detection device is determined, and: obtain the acquisition image of the M image collecting device;The M image collector is set to the image collecting device for acquiring the image in region locating at least one described detection device.The present invention is conducive to image needed for pointedly searching boundary defence, and only meets communication need by the network architecture of two-stage, improves real-time.

Description

Monitoring method, device and the system of boundary defence
Technical field
The present invention relates to safety-security area more particularly to a kind of monitoring methods of boundary defence, device and system.
Background technique
Boundary defence, it can be understood as effective in real time to the progress such as the illegal invasion of security area, theft, destruction and robbery Detection And Warning.Perimeter alarm is very important a part in weak current of intelligent building system.
It is existing in the related technology, the specific means of boundary defence can be such as: in the outer setting fence of security area, with right Intrusion behavior is detected and is fed back, however, its basis for implementing prevention is only the detection and feedback of fence, more single, nothing Method meets the actual demand of boundary defence.
Summary of the invention
The present invention provides monitoring method, device and the system of a kind of boundary defence, to solve the basis for implementing to take precautions against more It is single, the problem of being unable to satisfy the actual demand of boundary defence.
According to the first aspect of the invention, a kind of monitoring method of boundary defence is provided, monitoring device, packet are applied to It includes:
Receive the exception information of at least one of N number of detection device detection device transmission;The detection device includes electronics Fence, the exception information are generated when the detection device detects that circumference sends intrusion;
According to the exception information, at least one described corresponding M image collecting device of detection device is determined;The M A image collector is set to the image collecting device for acquiring the image in region locating at least one described detection device;
Obtain the acquisition image of the M image collecting device.
Optionally, the detection device includes fence, and the fence includes the electronic circuit for being connected with pulse electricity, The electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.
It optionally, further include following after the exception information for receiving the transmission of at least one of N number of detection device detection device At least one:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include with down toward It is one of few: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding alarm of the exception information at least one described in electronic map Information.
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud to put down Platform;
After getting the acquisition image, the acquisition image is sent to the cloud platform;
Recognition of face is carried out in the acquisition image.
According to the second aspect of the invention, a kind of monitoring device of boundary defence is provided, comprising:
Receiving module, for receiving the exception information of at least one of N number of detection device detection device transmission;The exception Information is generated when detecting that circumference invades;
Determining module, for determining that at least one described corresponding M image of detection device is adopted according to the exception information Acquisition means;The M image collector is set to the Image Acquisition for acquiring the image in region locating at least one described detection device Device;
Image collection module, for obtaining the acquisition image of the M image collecting device.
Optionally, the detection device includes fence, and the fence includes the electronic circuit for being connected with pulse electricity, The electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.
Optionally, the monitoring device of the boundary defence, further includes:
Alert process module externally exports the corresponding warning message of the exception information for controlling warning device;It is described Warning device includes at least one of: display, sound-light alarm component, audible alarm component, luminescence component;
Electronic map processing module, for the detection device corresponding position display institute at least one described in electronic map State the corresponding warning message of exception information.
Cloud platform sending module, for by the identification information of at least one the exception information, described detection device and/or Location information is sent to cloud platform, and: after getting the acquisition image, the acquisition image is sent to the cloud and is put down Platform;
Face recognition module, for carrying out recognition of face in the acquisition image.
According to the third aspect of the invention we, a kind of monitoring system of boundary defence is provided, comprising: monitoring device, multiple Detection device and multiple images acquisition device;The monitoring device connects with the detection device and image collecting device communication respectively It connects;
The detection device, for generating exception information when detecting that circumference invades, and to the monitoring device Send the exception information;
The monitoring device, for receiving the exception information of at least one of N number of detection device detection device transmission, according to The exception information determines at least one described corresponding M image collecting device of detection device, and: obtain the M figure As the acquisition image of acquisition device, the M image collector, which is set to, acquires region locating at least one described detection device The image collecting device of image.
Optionally, the detection device includes detection host and fence, and the fence includes being connected with pulse electricity Electronic circuit, the detection host be used for when the fence detects that circumference is invaded to the monitoring device hair The exception information is sent, and: the electrical parameter of the electricity of pulse provided by corresponding electronic circuit is controlled, the electrical parameter includes electricity Voltage crest value parameter.
Optionally, the detection host is specifically used for controlling the voltage peak of pulse electricity provided by corresponding electronic circuit Parameter is high-pressure peak or peak suction, and the high-pressure peak is greater than 5000 volts, and the peak suction is less than 5000 volts.
Optionally, the peak suction is 1500 volts.
Optionally, the detection device further includes power output component, and the electronic circuit includes fence alloy wire, described Power output component described in fence alloy wire direct or indirect connection, the pulse electricity are to be provided to the fence alloy wire , the detection host connects the power output component, to control corresponding fence alloy by the power output component The electrical parameter of the pulse electricity of line;
The detection device further includes the beginning bearing rod for transmitting alloy wire, connector, and be set on wall, end Bearing rod and at least one intermediate bar, the beginning bearing rod, at least one described intermediate bar and the end bearing rod are along water It puts down to being sequentially arranged;The intermediate bar is flexible mast;
The fence alloy wire states beginning bearing rod, at least one described intermediate bar and institute described in being horizontally sequentially connected End bearing rod is stated, and one end close to the beginning bearing rod of the fence alloy wire passes through described in connector connection One end of alloy wire is transmitted, the other end of the transmission alloy wire connects the power output component.
Optionally, the detection device further includes remote control equipment, the detection host and the remote control equipment communication connection;
The remote control equipment is used to send high-voltage trigger signal or low pressure trigger signal to the detection host;
The detection host is used for when receiving the high-voltage trigger signal, sets high for the voltage peak parameter Voltage crest value;And: when receiving the low pressure trigger signal, peak suction is set by the voltage peak parameter.
Optionally, the monitoring device is also used to after receiving the exception information, implements at least one of:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include with down toward It is one of few: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding alarm of the exception information at least one described in electronic map Information.
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud to put down Platform;
Recognition of face is carried out in the acquisition image.
According to the fourth aspect of the invention, a kind of electronic equipment, including memory and processor are provided;
The memory, for storing the executable instruction of the processor;
The processor is configured to be related to via the execution executable instruction to execute first aspect and its optinal plan Boundary defence monitoring method.
According to the fifth aspect of the invention, a kind of storage medium is provided, computer program is stored thereon with, feature exists In the monitoring method for the boundary defence that realization first aspect and its optinal plan are related to when the program is executed by processor.
Monitoring method, device and the system of boundary defence provided by the invention adopt image using image collecting device Collection, the expansible basis for implementing prevention, wherein the present invention can be simultaneously using the detection result of image and fence as in fact The basis of boundary defence is applied, content is more various.Meanwhile acquired image is directed to exception information and determination, it can Be conducive to image needed for pointedly searching boundary defence.
Meanwhile in the present invention, due to image collecting device and detection device be the equipment of security area need to be set, and Monitoring device, which may not need, is arranged in security area, in turn, the present invention can be conducive to only by the network architecture of two-stage come Meet communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, the present invention It can be conducive to improve communication efficiency, reduce the generation of delay, promote real-time, in turn, can also be convenient for the management of monitoring device The expansion of ability.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the monitoring method of boundary defence in one embodiment of the invention;
Fig. 2 is the flow diagram one of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 3 is the flow diagram two of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 4 is the flow diagram three of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 5 is the flow diagram four of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the monitoring device of boundary defence in one embodiment of the invention;
Fig. 7 is the structural schematic diagram of the monitoring device of boundary defence in another embodiment of the present invention;
Fig. 8 is the structural schematic diagram of the monitoring system of boundary defence in one embodiment of the invention;
Fig. 9 is the structural schematic diagram of the monitoring system of boundary defence in another embodiment of the present invention;
Figure 10 is the structural schematic diagram of the monitoring system of boundary defence in yet another embodiment of the invention;
Figure 11 is the structural schematic diagram of detection device in one embodiment of the invention;
Figure 12 is the structural schematic diagram of detection device in another embodiment of the present invention;
Figure 13 is the structural schematic diagram of electronic equipment in one embodiment of the invention.
Description of symbols:
1- detection device;
101- detects host;
102- power output component;
103- transmits alloy wire;
104- fence alloy wire;
The beginning 105- bearing rod;
The end 106- bearing rod;
107- intermediate bar;
108- connector;
109- warning sign;
110- connector;
111- collector;
Bearing rod among 112-;
113- insulator;
114- arrester;
The monitoring device of 200- boundary defence;
201- receiving module;
202- determining module;
203- image collection module;
204- face recognition module;
205- alert process module;
206- electronic map processing module;
207- cloud platform sending module;
3- image collecting device;
4- warning device;
5- cloud platform;
6- divides pocket.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to Here the sequence other than those of diagram or description is implemented.In addition, term " includes " and " having " and their any deformation, Be intended to cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, product or setting It is standby those of to be not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for these mistakes The intrinsic other step or units of journey, method, product or equipment.
Technical solution of the present invention is described in detail with specifically embodiment below.These specific implementations below Example can be combined with each other, and the same or similar concept or process may be repeated no more in some embodiments.
Fig. 1 is the flow diagram of the monitoring method of boundary defence in one embodiment of the invention.
Referring to FIG. 1, the monitoring method of boundary defence, is applied to monitoring device, comprising:
S11: the exception information of at least one of N number of detection device detection device transmission is received.
The detection device may include fence, and fence can be regarded as to feed back when being broken into, So that detection device can issue any device of exception information, meanwhile, detection device may also include detection host, detection Host can be connect with fence, to issue exception information when fence is broken into.
In one of embodiment, the fence includes the electronic circuit for being connected with pulse electricity, the pulse electricity Electrical parameter can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.Specifically, voltage peak is joined Number can be set to high-pressure peak or peak suction, and high-pressure peak therein can be greater than 5000 volts, and the peak suction can be small In 5000 volts.In concrete example, which be can be in 5000 volts to 10000 volts of section, and the peak suction can be with It is 1500 volts or so.
In turn, user free switching mode, high pressure mode can produce peak value according to different needs as 5000- The pulse of the high-pressure peak of 10000V, low-voltage can produce the pulse for the peak suction that peak value is 1500v or so.Specifically make Used time, can daytime or have personnel near fence operation into being switched to the low-voltage that peak value of pulse is 1500V or so, this Keep the pulse hitting dynamics of front end fence smaller, if can be restored to peak value of pulse is when night or vigilant higher safety The high pressure mode of 5000-10000V.
In one of embodiment, pulse electricity can be scanned for 60 times for example per minute, other than detection effect itself, also Invader can be made to be difficult to climb up and over, further its effect for arriving safety guarantee.Specifically, when invader's climbing or destruction fence Pulse electric shock can be generated to it, further, the defeated of warning message can be led under the abnormal conditions such as electric shock, short circuit and open circuit Out.
Exception information, it can be understood as generated when the detection device detects that circumference invades and by detection device Any information issued is specifically as follows and generates when the electronic circuit in fence referred to above is broken into;It can It is transmitted along with the location information and/or identification information of corresponding detection device.
In addition, the content that characterization circumference invades can be multiplicity according to the difference of used detection device, it should Different detection devices, can also such as infrared emission, vibration optical cable, leakage cable etc..As it can be seen that being visited involved in the present embodiment Survey means are not limited to fence, may also include it is above done enumerate, no matter that is, using which kind of detection means, as long as realizing The description of step S11 and step S12 just do not depart from the description range of method involved in the present embodiment.
S12: according to the exception information, at least one described corresponding M image collecting device of detection device is determined.
M image collecting device, it can be understood as be the image for acquiring region locating at least one described detection device Image collecting device, it is seen then that the corresponding relationship of detection device and image collecting device is according to fence in detection device What position and/or shooting angle of position and image collecting device etc. determined, meanwhile, which is not intended to limit quantity, Such as: a detection device can correspond to one or more image collecting devices, and an image collecting device can also correspond to one A or multiple detection devices.
It determines the process of M image collecting device, also may be, for example, the identification information for getting M image collecting device And/or location information.
Image collecting device, it can be understood as arbitrarily can be realized the device of Image Acquisition, which can be scattered Photo, or continuous video, in specific implementation process, the image collecting device for example can for video camera, camera, Camera etc. also for example can be the mobile phone for having image collecting function, computer etc..
S13: the acquisition image of the M image collecting device is obtained.
The process for obtaining acquisition image then can receive Image Acquisition for example including acquisition request is sent to image collecting device The acquisition image that device is sent according to acquisition request.In a kind of embodiment, element of time can be also carried in the acquisition request, In turn, image collecting device can send particular point in time or the acquisition image of period according to element of time.
The monitoring method of boundary defence provided in this embodiment, the acquisition using image collecting device to image are expansible Implement the basis of prevention, wherein the present embodiment can be anti-using the detection result of image and fence as circumference is implemented simultaneously The basis of model, content are more various.Meanwhile acquired image is directed to exception information and determination, can be conducive to needle Image needed for searching property boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in, And monitoring device may not need and security area is arranged in, in turn, the present invention can be conducive to the only network architecture by two-stage Meet communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this reality Applying example can be conducive to improve communication efficiency, reduce the generation of delay, promote real-time, in turn, can also be convenient for monitoring device The expansion of managerial ability.
Fig. 2 is the flow diagram one of the monitoring method of boundary defence in another embodiment of the present invention.
Referring to FIG. 2, after step s 13, may also include step S13: carrying out recognition of face in the acquisition image.
By recognition of face, the identity information of the available personnel to the personnel or neighbouring position that invade, in turn, It can be conducive to the identity of the personnel invaded to related personnel's feedback output, and: it is selected in time to be convenient for checking intrusion The Security Personnel of position actual conditions is convenient for further monitoring management.Such as: if the personnel invaded are security personnel, It can not then be handled, if the personnel invaded are non-resident, non-trade company, either for such as wanted criminal, habitual offender or The member etc. of the blacklist prestored then can further trigger the function such as local alarm, platform alarm, public security alarm.
As it can be seen that introducing of the present embodiment by recognition of face, so that the basis for security protection further comprises face Identification as a result, or be interpreted as identity information, can be convenient for more accurately carrying out safeguard management.
Fig. 3 is the flow diagram two of the monitoring method of boundary defence in another embodiment of the present invention.
After step s 11, may also include step S15: it is corresponding that control warning device externally exports the exception information Warning message.
The warning message can be any information triggered by exception information, according to the difference of warning device, form It can be multiplicity, such as: the warning device includes at least one of: display, sound-light alarm component, audible alarm group Part, luminescence component.If display, then the warning message can be any information shown suitable for display, for example, notify, Image, text etc., if sound-light alarm component, then the warning message can be to combine sound and luminous any information, Such as by voice broadcast special sound content, it is simultaneously emitted by the light of specific frequency and/or color;If luminescence component, then should Warning message can be any information based on luminous characterization alarm;Wherein it is possible to specific luminous frequency and/or color table Sign, can also by the way that luminous luminescence unit occurs in luminescence component, which is is characterized, also may be, for example, characterization different function Different indicator lights.
The warning device may be disposed at detection device neighbouring position, to carry out alarm to the personnel invaded, can also set It is placed near monitoring device, or is set in the carry-on equipment of each security personnel, as long as realizing alarm, do not depart from this reality Apply the description of example.
In specific implementation process, which can also change according to the difference of exception information, for example, not same district The exception information of the detection device in domain, producing cause difference of exception information etc. can produce different warning messages, therein Sound that different warning messages can be for example different, different luminescence units, different luminous frequencies, different images, difference Text etc..
Whether in addition, step S15 can be implemented any time after step s 11, and it is real to be not only restricted to other steps It applies, and whether finished.
Fig. 4 is the flow diagram three of the monitoring method of boundary defence in another embodiment of the present invention.
Referring to FIG. 4, step S16: described in the corresponding position of detection device is shown at least one described in electronic map The corresponding warning message of exception information.
Electronic map, it will be appreciated that for the map that corresponding to boundary defence can be built situation and be characterized, can be Two-dimensional map, or three-dimensional map, fineness and modeling source, all can be arbitrary, according to need at that time Asking arbitrarily to change.
Meanwhile detection device can have been characterized in electronic map, it can not also characterize, in turn, when needing display alarm information, only Warning message need to be shown in corresponding position.
In specific implementation process, main architectural plane position can be clearly indicated in electronic map and respectively set up defences a position and Number, will not wear, and the states such as the operation of energy display system, Defence areas alarm, normal and failure.
Content in relation to warning message can refer to associated description understanding above, specifically, using display electronic map Display shows the warning message.
By embodiment of above, related personnel can be conducive to and accurately learn the position being abnormal.
Fig. 5 is the flow diagram four of the monitoring method of boundary defence in another embodiment of the present invention.
Referring to FIG. 5, may also include step S16 after step S11: at least one the exception information, described are detected The identification information and/or location information of device are sent to cloud platform.It, can also be by institute meanwhile after getting the acquisition image It states acquisition image and is sent to the cloud platform.
In turn, cloud platform can record the information received, convenient for checking and tracing later.Can also it be convenient for simultaneously Cloud platform carries out further intellectual analysis.
It, can also be before sending to abnormal personnel therein if acquisition image is sent to cloud platform in specific implementation process It is marked, cloud platform can be in the case where receiving multiple labels has abnormal personnel, by the correlation of exception personnel Message identification is the member of blacklist, in turn, if can trigger specific in the member for identifying blacklist in conjunction with step S14 Default alarm, the default alarm can be issued using alarm device or electronic map referred to above.
As it can be seen that the monitoring method of boundary defence provided in this embodiment, the acquisition using image collecting device to image, it can The basis of prevention is implemented in extension, wherein the present embodiment can be simultaneously using the detection result of image and fence as implementation week The basis of boundary's prevention, content are more various.Meanwhile acquired image is directed to exception information and determination, it can be advantageous The image needed for pointedly searching boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in, And monitoring device may not need and security area is arranged in, in turn, the present embodiment can be conducive to the only network rack by two-stage Structure meets communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this Embodiment can be conducive to improve communication efficiency, reduce the generation of delay, and monitoring device can be also convenient in turn by promoting real-time Managerial ability expansion.
Fig. 6 is the structural schematic diagram of the monitoring device of boundary defence in one embodiment of the invention.Fig. 7 is another reality of the present invention Apply the structural schematic diagram of the monitoring device of boundary defence in example.
Please refer to Fig. 6 and Fig. 7, the monitoring device 200 of boundary defence, comprising:
Receiving module 201, for receiving the exception information of at least one of N number of detection device 1 detection device 1 transmission;Institute Stating exception information is generated when detecting that circumference invades;
Determining module 202, for determining at least one described detection device 1 corresponding M figure according to the exception information As acquisition device 3;The M image collecting device 3 is the figure for acquiring the image in region locating at least one described detection device 3 As acquisition device 3;
Image collection module 203, for obtaining the acquisition image of the M image collecting device 3.
The monitoring device of boundary defence involved in the present embodiment can be used for implementing the boundary defence of embodiment illustrated in fig. 1 Monitoring method, technological means, technical effect and optional embodiment can refer to the associated description of embodiment illustrated in fig. 1 Understand.
Optionally, the detection device includes fence, and the fence includes the electronic circuit for being connected with pulse electricity, The electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.
Optionally, the monitoring device 200 of the boundary defence, further includes:
Alert process module 205 externally exports the corresponding warning message of the exception information for controlling warning device 4; The warning device 4 includes at least one of: display, sound-light alarm component, audible alarm component, luminescence component;
It is aobvious to be used for the corresponding position of detection device 1 at least one described in electronic map for electronic map processing module 206 Show the corresponding warning message of the exception information;
Cloud platform sending module 207, for by the identification information of at least one the exception information, described detection device 1 And/or location information is sent to cloud platform 5, and and: after getting the acquisition image, the acquisition image is sent to institute State cloud platform 5.
As it can be seen that the monitoring device of boundary defence provided in this embodiment, the acquisition using image collecting device to image, it can The basis of prevention is implemented in extension, wherein the present embodiment can be simultaneously using the detection result of image and fence as implementation week The basis of boundary's prevention, content are more various.Meanwhile acquired image is directed to exception information and determination, it can be advantageous The image needed for pointedly searching boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in, And monitoring device may not need and security area is arranged in, in turn, the present embodiment can be conducive to the only network rack by two-stage Structure meets communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this Embodiment can be conducive to improve communication efficiency, reduce the generation of delay, and monitoring device can be also convenient in turn by promoting real-time Managerial ability expansion.
Fig. 8 is the structural schematic diagram of the monitoring system of boundary defence in one embodiment of the invention.
Referring to FIG. 8, the monitoring system of boundary defence, comprising: monitoring device 2, multiple detection devices 1 are adopted with multiple images Acquisition means 3;The monitoring device 2 respectively with the detection device 1 and 3 communication connection of image collecting device;The detection device 1 Including fence and detection host 101.
Monitoring device 2, detection device 1 and image collecting device 3 referred to above, can refer to preceding method embodiment Associated description understands.
The detection device 1, for generating exception information when detecting that circumference invades, and to the monitoring device 3 send the exception information.
The monitoring device 2, for receiving the exception information of at least one of N number of detection device 1 detection device 1 transmission, According to the exception information, at least one described corresponding M image collecting device 3 of detection device 1 is determined, and: obtain institute State the acquisition image of M image collecting device 3;The M image collecting device 3 is to acquire at least one described detection device 1 The image collecting device of the image in locating region.
In one of embodiment, as illustrated in preceding method embodiment, the detection device includes detection master Machine and fence, the fence may include the electronic circuit including being connected with pulse electricity, and the detection host 101 is used for The exception information is sent to the monitoring device when the fence detects that circumference is invaded, and: control pair The electrical parameter of the electricity of pulse provided by the electronic circuit answered, the electrical parameter include voltage peak parameter.
In specific implementation process, the detection host 101 is specifically used for controlling pulse provided by corresponding electronic circuit The voltage peak parameter of electricity is high-pressure peak or peak suction, and the high-pressure peak is greater than 5000 volts, and the peak suction is less than 5000 volts.Such as high-pressure peak may be in 5000 volts to 10000 volts of section, peak suction can be 1500 volts or so.
Fig. 9 is the structural schematic diagram of the monitoring system of boundary defence in another embodiment of the present invention.
Referring to FIG. 9, the monitoring device, is also used to after receiving the exception information, implement it is following at least it One:
Control warning device 4 externally exports the corresponding warning message of the exception information;The warning device 4 includes following At least one: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device 1 shows the corresponding alarm of the exception information at least one described in electronic map Information;
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud to put down Platform 5;
Recognition of face is carried out in the acquisition image.
Above functions can refer to step S14, S15 and the associated description of step S16 in embodiment of the method and understand, It is applicable to any optional means of implementation steps S14 to the relevant implementation process of step S16.
In one of embodiment, monitoring device 2 can also connect iversion controller 6, and the quantity of iversion controller 6 can be individually, It is also possible to multiple, in turn, the control of external server, unit is received using iversion controller 6, for example, may be in response to point The control of device is controlled, realizes deploying to ensure effective monitoring and control of illegal activities, removing the functions such as control, setting high-pressure peak, setting peak suction for detection device 1.
In specific citing, the present embodiment can be by passing through RS485, CAN bus technology or base for the detection device 1 of circumference It is connected to monitoring device 2 in TCP/IP network technology, and then the control to front end detection device 1 can be realized by monitoring device 2, The alarm signal of front-end detector is obtained, then by image collecting device 3, gets 1 associated images acquisition device of detection device Image, specifically also interception image and can identify wherein face information, recognition result is recorded and passes through language together with warning message Sound synthesis mode is broadcasted, and notifies the management and monitoring device 2 of Security Personnel.
As it can be seen that the present embodiment optinal plan can support alarm cloud computing service, cloud management is realized by IOT technology. Meanwhile recognition of face, speech recognition, speech synthesis technique can be also applied to boundary defence field, and use embedded architecture, System energy consumption is reduced relative to traditional PC platform.
Figure 10 is the structural schematic diagram of the monitoring system of boundary defence in yet another embodiment of the invention.
Referring to FIG. 10, the quantity of monitoring device 2 can be multiple, and then, it can be achieved that variant monitoring device integration Management, meanwhile, by taking related blacklist above as an example, it is sent to cloud platform after 2 identification of monitoring device, and through cloud After platform is determined as black list member, which can be updated to each monitoring device 2 by one of any monitoring device 2, That is: the black list member that monitoring device 2 is also used to receive cloud platform transmission updates information update local blacklist, and according to current Local blacklist export warning information, such as: the corresponding particular alert information of output black list member can be default 's.
Figure 11 is the structural schematic diagram of detection device in one embodiment of the invention;Figure 12 is visited in another embodiment of the present invention Survey the structural schematic diagram of device.
Figure 11 and Figure 12 are please referred to, the detection device further includes power output component 102, and the electronic circuit includes enclosing Column alloy wire 104, power output component 102 described in 104 direct or indirect connection of fence alloy wire, the pulse electricity be by It is provided to the fence alloy wire 103, the detection host 101 connects the power output component 102, to pass through the electricity Energy output precision 102 controls the electrical parameter of the pulse electricity of corresponding fence alloy wire 103.
Power output component 102 can be provided for example comprising each positive output interface and negative output interface, and ground connection mouth Electric energy can be and received from source side, for example, each positive output interface is connected directly or indirectly to a rhizosphere column alloy Line 104 does not depart from the description of the present embodiment as long as realizing the output of electric energy.
In one of embodiment, the detection device 1 further includes transmission alloy wire 103, connector 108, Yi Jishe Beginning bearing rod 105, end bearing rod 106 and at least one intermediate bar 107 being placed on wall, the beginning bearing rod 105, At least one described intermediate bar 107 is horizontally sequentially arranged with the end bearing rod 106;The intermediate bar 107 is flexibility Mast, bearing rod can be the bar of rigidity.The fence alloy wire 104 states beginning bearing rod described in being horizontally sequentially connected 105, at least one described intermediate bar 107 and the end bearing rod 106, and the close beginning of the fence alloy wire 104 One end of bottom bearing bar 105 connects one end of the transmission alloy wire 103, the transmission alloy wire by the connector 108 103 other end connects the power output component 102.
Since intermediate bar 107 is flexible link, the weight of human body is not supported with alloy wire, the personnel of further avoiding climb A possibility that climbing improves safety protection function.Meanwhile can be conducive to perceive the invasion of invader again, and issue alarm signal, really Insurance system it is safe and reliable.
In concrete example, intermediate bar 107 can be the flexible PV mast of fence.
In specific implementation process, detection device 1, may also include that warning sign 109, another connector 110, collector 111, Intermediate bearing rod 112, insulator 113 and arrester 114.
Wherein, one end by proximal end bearing rod 106 of fence alloy wire 104 can connect centre by connector 110 and connect Wiring, and then other fence alloy wires are connected to by intermediate connections and another connector 110.Fence alloy wire 104 can lead to It crosses insulator 113 and connects intermediate bar 107.
Fence alloy wire 104 can also be connected with the warning sign 109 and collector 111.
In addition, can also be equipped with intermediate bearing rod 112 between beginning bearing rod 105 and end bearing rod 106.Intermediate bearing rod 112 can also be on connecting wall.Arrester 114 can be also connected between beginning bearing rod 105 and fence alloy wire 104.
In the specific implementation process, Figure 11 is please referred to, a detection host 101 can correspond to power output component 102 One group of fence alloy wire corresponds to a pair of of beginning bearing rod 105 and end bearing rod 106;In other implementation processes, it please join Figure 12 is examined, a detection host 101 and power output component 102 can correspond to more than one set group fence alloy wire, that is, correspond to More than a pair of beginning bearing rod 105 and end bearing rod 106.
In one of embodiment, the detection device 1 further includes remote control equipment, the detection host 101 with it is described Remote control equipment communication connection.
The remote control equipment is used to send high-voltage trigger signal or low pressure trigger signal to the detection host;
The detection host 101 is used for when receiving the high-voltage trigger signal, by the voltage peak parameter setting For high-pressure peak;And: when receiving the low pressure trigger signal, peak suction is set by the voltage peak parameter.
Wherein, remote control equipment can be used for carrying for personnel, in turn, can be convenient for the practical control at scene.
In addition, the remote control equipment is also used to send deployment trigger signal or trigger signal of withdrawing a garrison to the detection host.
The detection host 101 be used for receive it is described withdraw a garrison trigger signal when, control power output component 102 stops Export pulse electricity;And: when receiving the deployment trigger signal, control power output component 102 starts to export pulse electricity.
As it can be seen that by remote control equipment, the control that high pressure may be implemented, low pressure, withdraw a garrison, deploy troops on garrison duty etc..
The monitoring system of boundary defence provided in this embodiment, the acquisition using image collecting device to image are expansible Implement the basis of prevention, wherein the present embodiment can be anti-using the detection result of image and fence as circumference is implemented simultaneously The basis of model, content are more various.Meanwhile acquired image is directed to exception information and determination, can be conducive to needle Image needed for searching property boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in, And monitoring device may not need and security area is arranged in, in turn, the present embodiment can be conducive to the only network rack by two-stage Structure meets communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this Embodiment can be conducive to improve communication efficiency, reduce the generation of delay, and monitoring device can be also convenient in turn by promoting real-time Managerial ability expansion.
Figure 13 is the structural schematic diagram of electronic equipment in one embodiment of the invention.
Figure 13 is please referred to, electronic equipment 70 may include memory 72 and processor 71.
The memory 72, for storing the executable instruction of the processor 71.
The processor 71 is configured to execute week involved in the above optinal plan via the executable instruction is executed The monitoring method of boundary's prevention.
The present embodiment additionally provides a kind of storage medium, is stored thereon with computer program, which is executed by processor The monitoring method for the boundary defence that Shi Shixian or more optinal plan is related to.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of monitoring method of boundary defence is applied to monitoring device characterized by comprising
Receive the exception information of at least one of N number of detection device detection device transmission;The exception information is in the detection Device, which detects, to be generated when circumference invades;
According to the exception information, at least one described corresponding M image collecting device of detection device is determined;The M figure As the image collecting device that acquisition device is the image in region locating for detection device at least one described in acquisition;
Obtain the acquisition image of the M image collecting device.
2. the electronics encloses the method according to claim 1, wherein the detection device includes fence Column includes the electronic circuit for being connected with pulse electricity, and the electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes institute State the voltage peak parameter of pulse electricity.
3. method according to claim 1 or 2, which is characterized in that receive at least one of N number of detection device detection device Further include at least one of after the exception information of transmission:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include it is following at least it One: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding warning message of the exception information at least one described in electronic map;
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud platform;
After getting the acquisition image, the acquisition image is sent to the cloud platform;
Recognition of face is carried out in the acquisition image.
4. a kind of monitoring device of boundary defence characterized by comprising
Receiving module, for receiving the exception information of at least one of N number of detection device detection device transmission, the exception information It is to be generated when the detection device detects that circumference invades;
Determining module, for determining at least one described corresponding M image collector of detection device according to the exception information It sets;The M image collector is set to the image collecting device for acquiring the image in region locating at least one described detection device;
Image collection module, for obtaining the acquisition image of the M image collecting device.
5. a kind of monitoring system of boundary defence characterized by comprising monitoring device, multiple detection devices and multiple images Acquisition device;The monitoring device respectively with the detection device and image collecting device communication connection;
The detection device is sent for generating exception information when detecting that circumference invades, and to the monitoring device The exception information;
The monitoring device, for receiving the exception information of at least one of N number of detection device detection device transmission, according to described Exception information determines at least one described corresponding M image collecting device of detection device, and: it obtains the M image and adopts The acquisition image of acquisition means;The M image collector is set to the image for acquiring region locating at least one described detection device Image collecting device.
6. system according to claim 5, which is characterized in that the detection device includes detecting host and fence, The fence includes the electronic circuit for being connected with pulse electricity, and the detection host is used to detect circumference in the fence The exception information is sent to the monitoring device when invading, and: control pulse provided by corresponding electronic circuit The electrical parameter of electricity, the electrical parameter includes voltage peak parameter.
7. system according to claim 6, which is characterized in that the detection host is specifically used for controlling corresponding electric wire The voltage peak parameter of the electricity of pulse provided by road is high-pressure peak or peak suction, and the high-pressure peak is greater than 5000 volts, institute Peak suction is stated less than 5000 volts.
8. system according to claim 6 or 7, which is characterized in that the detection device further includes power output component, institute Stating electronic circuit includes fence alloy wire, power output component described in the fence alloy wire direct or indirect connection, the arteries and veins Punching electricity is provided to the fence alloy wire, and the detection host connects the power output component, to pass through the electricity Energy output precision controls the electrical parameter of the pulse electricity of corresponding fence alloy wire;
The detection device further includes transmission alloy wire, connector, and the beginning bearing rod, the end load that are set on wall Bar and at least one intermediate bar, the beginning bearing rod, at least one described intermediate bar and the end bearing rod are horizontally It is sequentially arranged;The intermediate bar is flexible mast;
The fence alloy wire states beginning bearing rod, at least one described intermediate bar and the end described in being horizontally sequentially connected Bottom bearing bar, and one end close to the beginning bearing rod of the fence alloy wire connects the transmission by the connector The other end of one end of alloy wire, the transmission alloy wire connects the power output component.
9. system according to claim 6 or 7, which is characterized in that the detection device further includes remote control equipment, the spy Survey host and the remote control equipment communication connection;
The remote control equipment is used to send high-voltage trigger signal or low pressure trigger signal to the detection host;
The detection host is used for when receiving the high-voltage trigger signal, sets high voltage crest for the voltage peak parameter Value;And: when receiving the low pressure trigger signal, peak suction is set by the voltage peak parameter.
10. according to the described in any item systems of claim 5 to 7, which is characterized in that the monitoring device is also used to receiving To after the exception information, implement at least one of:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include it is following at least it One: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding warning message of the exception information at least one described in electronic map;
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud platform;
Recognition of face is carried out in the acquisition image.
CN201910045715.1A 2019-01-17 2019-01-17 Monitoring method, device and the system of boundary defence Pending CN109658648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910045715.1A CN109658648A (en) 2019-01-17 2019-01-17 Monitoring method, device and the system of boundary defence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910045715.1A CN109658648A (en) 2019-01-17 2019-01-17 Monitoring method, device and the system of boundary defence

Publications (1)

Publication Number Publication Date
CN109658648A true CN109658648A (en) 2019-04-19

Family

ID=66119837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910045715.1A Pending CN109658648A (en) 2019-01-17 2019-01-17 Monitoring method, device and the system of boundary defence

Country Status (1)

Country Link
CN (1) CN109658648A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784987A (en) * 2020-07-13 2020-10-16 广元量知汇科技有限公司 Intelligent security alarm system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136174A (en) * 2011-03-30 2011-07-27 吴洪伟 Multi-defence area electronic perimeter and protection method thereof
US20130188044A1 (en) * 2012-01-19 2013-07-25 Utechzone Co., Ltd. Intelligent monitoring system with automatic notification and intelligent monitoring device thereof
CN203503089U (en) * 2013-10-12 2014-03-26 大连华悦电子有限公司 Peripheral alarming and precaution linkage system
CN204576718U (en) * 2015-04-29 2015-08-19 北京欣秦林科技发展有限公司 A kind of pulse electronic fence perimeter alarm system
CN107993385A (en) * 2017-12-29 2018-05-04 上海誉浩信息技术有限公司 A kind of intelligence perimeter alarm intruder detection system and its detection method
CN108986364A (en) * 2018-08-28 2018-12-11 苏州三股道信息科技有限公司 Perimeter security crime prevention system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136174A (en) * 2011-03-30 2011-07-27 吴洪伟 Multi-defence area electronic perimeter and protection method thereof
US20130188044A1 (en) * 2012-01-19 2013-07-25 Utechzone Co., Ltd. Intelligent monitoring system with automatic notification and intelligent monitoring device thereof
CN203503089U (en) * 2013-10-12 2014-03-26 大连华悦电子有限公司 Peripheral alarming and precaution linkage system
CN204576718U (en) * 2015-04-29 2015-08-19 北京欣秦林科技发展有限公司 A kind of pulse electronic fence perimeter alarm system
CN107993385A (en) * 2017-12-29 2018-05-04 上海誉浩信息技术有限公司 A kind of intelligence perimeter alarm intruder detection system and its detection method
CN108986364A (en) * 2018-08-28 2018-12-11 苏州三股道信息科技有限公司 Perimeter security crime prevention system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784987A (en) * 2020-07-13 2020-10-16 广元量知汇科技有限公司 Intelligent security alarm system
CN111784987B (en) * 2020-07-13 2021-03-23 深圳智乐未来机器人技术有限公司 Intelligent security alarm system

Similar Documents

Publication Publication Date Title
CN202196177U (en) Circuit monitoring system
CN205193981U (en) Radar vision fuses intelligent warning system with low misstatement rate
CN104317918B (en) Abnormal behaviour analysis and warning system based on compound big data GIS
CN104537788A (en) High voltage electric transmission line external damage-proof intelligent image pre-warning system and method
CN108665656A (en) A kind of power station intrusion preventing alarm system
CN202268048U (en) Security monitoring system
CN100470595C (en) Circumference all-weather defence system
CN208903386U (en) Intrusion alarm equipment and system
CN104464138A (en) Solar multiplex recognition anti-theft monitoring early warning system low in power consumption
CN108806144A (en) A kind of community alarm system based on 5G networks
CN110827500B (en) Intelligent security method and system
CN105389962A (en) One-key alarm system based on mobile intelligent terminals
CN103227916A (en) Backup method, device and system of monitoring video
CN109658648A (en) Monitoring method, device and the system of boundary defence
CN208460141U (en) Forbidden zone intrusion alarm system
CN208819329U (en) A kind of safety supervision system being able to carry out positioning early warning in real time
CN103745543A (en) A high-voltage pulse electronic fence
CN105844821A (en) Transformer field anti-theft monitoring device and method
CN211710855U (en) Unmanned autonomous comprehensive alarm system
CN105608818A (en) Intelligent anti-invasion safety monitoring equipment based on Internet of Things
CN213211330U (en) Detection system of fire fighting access
CN205428082U (en) Intelligence prevents invading safety monitoring device based on thing networking
CN107633631B (en) Boundary monitoring method with obstacle and control equipment
CN206557937U (en) Intelligent external force damage prevention power transmission line monitoring device based on video monitoring
CN206024005U (en) A kind of Active Eyes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190419