CN109658648A - Monitoring method, device and the system of boundary defence - Google Patents
Monitoring method, device and the system of boundary defence Download PDFInfo
- Publication number
- CN109658648A CN109658648A CN201910045715.1A CN201910045715A CN109658648A CN 109658648 A CN109658648 A CN 109658648A CN 201910045715 A CN201910045715 A CN 201910045715A CN 109658648 A CN109658648 A CN 109658648A
- Authority
- CN
- China
- Prior art keywords
- detection device
- image
- exception information
- detection
- fence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012544 monitoring process Methods 0.000 title claims abstract description 38
- 238000001514 detection method Methods 0.000 claims abstract description 156
- 238000012806 monitoring device Methods 0.000 claims abstract description 58
- 230000005540 biological transmission Effects 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims abstract description 17
- 239000000956 alloy Substances 0.000 claims description 38
- 229910045601 alloy Inorganic materials 0.000 claims description 38
- 230000005611 electricity Effects 0.000 claims description 36
- 238000004020 luminiscence type Methods 0.000 claims description 12
- 210000001367 artery Anatomy 0.000 claims 1
- 238000004080 punching Methods 0.000 claims 1
- 210000003462 vein Anatomy 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 27
- 238000005516 engineering process Methods 0.000 description 11
- 230000002265 prevention Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000012512 characterization method Methods 0.000 description 3
- 239000012212 insulator Substances 0.000 description 3
- 230000001737 promoting effect Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 230000009194 climbing Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 238000003786 synthesis reaction Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000002650 habitual effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical compound [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000000082 states acquisition Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/12—Mechanical actuation by the breaking or disturbance of stretched cords or wires
- G08B13/122—Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/12—Mechanical actuation by the breaking or disturbance of stretched cords or wires
- G08B13/122—Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
- G08B13/124—Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence with the breaking or disturbance being optically detected, e.g. optical fibers in the perimeter fence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/19—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
Abstract
The present invention provides a kind of monitoring method of boundary defence, device and system, the system, including monitoring device, multiple detection devices and multiple images acquisition device;The detection device sends the exception information for generating exception information when detecting that circumference invades, and to the monitoring device;The monitoring device, for receiving the exception information of at least one of N number of detection device detection device transmission, according to the exception information, at least one described corresponding M image collecting device of detection device is determined, and: obtain the acquisition image of the M image collecting device;The M image collector is set to the image collecting device for acquiring the image in region locating at least one described detection device.The present invention is conducive to image needed for pointedly searching boundary defence, and only meets communication need by the network architecture of two-stage, improves real-time.
Description
Technical field
The present invention relates to safety-security area more particularly to a kind of monitoring methods of boundary defence, device and system.
Background technique
Boundary defence, it can be understood as effective in real time to the progress such as the illegal invasion of security area, theft, destruction and robbery
Detection And Warning.Perimeter alarm is very important a part in weak current of intelligent building system.
It is existing in the related technology, the specific means of boundary defence can be such as: in the outer setting fence of security area, with right
Intrusion behavior is detected and is fed back, however, its basis for implementing prevention is only the detection and feedback of fence, more single, nothing
Method meets the actual demand of boundary defence.
Summary of the invention
The present invention provides monitoring method, device and the system of a kind of boundary defence, to solve the basis for implementing to take precautions against more
It is single, the problem of being unable to satisfy the actual demand of boundary defence.
According to the first aspect of the invention, a kind of monitoring method of boundary defence is provided, monitoring device, packet are applied to
It includes:
Receive the exception information of at least one of N number of detection device detection device transmission;The detection device includes electronics
Fence, the exception information are generated when the detection device detects that circumference sends intrusion;
According to the exception information, at least one described corresponding M image collecting device of detection device is determined;The M
A image collector is set to the image collecting device for acquiring the image in region locating at least one described detection device;
Obtain the acquisition image of the M image collecting device.
Optionally, the detection device includes fence, and the fence includes the electronic circuit for being connected with pulse electricity,
The electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.
It optionally, further include following after the exception information for receiving the transmission of at least one of N number of detection device detection device
At least one:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include with down toward
It is one of few: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding alarm of the exception information at least one described in electronic map
Information.
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud to put down
Platform;
After getting the acquisition image, the acquisition image is sent to the cloud platform;
Recognition of face is carried out in the acquisition image.
According to the second aspect of the invention, a kind of monitoring device of boundary defence is provided, comprising:
Receiving module, for receiving the exception information of at least one of N number of detection device detection device transmission;The exception
Information is generated when detecting that circumference invades;
Determining module, for determining that at least one described corresponding M image of detection device is adopted according to the exception information
Acquisition means;The M image collector is set to the Image Acquisition for acquiring the image in region locating at least one described detection device
Device;
Image collection module, for obtaining the acquisition image of the M image collecting device.
Optionally, the detection device includes fence, and the fence includes the electronic circuit for being connected with pulse electricity,
The electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.
Optionally, the monitoring device of the boundary defence, further includes:
Alert process module externally exports the corresponding warning message of the exception information for controlling warning device;It is described
Warning device includes at least one of: display, sound-light alarm component, audible alarm component, luminescence component;
Electronic map processing module, for the detection device corresponding position display institute at least one described in electronic map
State the corresponding warning message of exception information.
Cloud platform sending module, for by the identification information of at least one the exception information, described detection device and/or
Location information is sent to cloud platform, and: after getting the acquisition image, the acquisition image is sent to the cloud and is put down
Platform;
Face recognition module, for carrying out recognition of face in the acquisition image.
According to the third aspect of the invention we, a kind of monitoring system of boundary defence is provided, comprising: monitoring device, multiple
Detection device and multiple images acquisition device;The monitoring device connects with the detection device and image collecting device communication respectively
It connects;
The detection device, for generating exception information when detecting that circumference invades, and to the monitoring device
Send the exception information;
The monitoring device, for receiving the exception information of at least one of N number of detection device detection device transmission, according to
The exception information determines at least one described corresponding M image collecting device of detection device, and: obtain the M figure
As the acquisition image of acquisition device, the M image collector, which is set to, acquires region locating at least one described detection device
The image collecting device of image.
Optionally, the detection device includes detection host and fence, and the fence includes being connected with pulse electricity
Electronic circuit, the detection host be used for when the fence detects that circumference is invaded to the monitoring device hair
The exception information is sent, and: the electrical parameter of the electricity of pulse provided by corresponding electronic circuit is controlled, the electrical parameter includes electricity
Voltage crest value parameter.
Optionally, the detection host is specifically used for controlling the voltage peak of pulse electricity provided by corresponding electronic circuit
Parameter is high-pressure peak or peak suction, and the high-pressure peak is greater than 5000 volts, and the peak suction is less than 5000 volts.
Optionally, the peak suction is 1500 volts.
Optionally, the detection device further includes power output component, and the electronic circuit includes fence alloy wire, described
Power output component described in fence alloy wire direct or indirect connection, the pulse electricity are to be provided to the fence alloy wire
, the detection host connects the power output component, to control corresponding fence alloy by the power output component
The electrical parameter of the pulse electricity of line;
The detection device further includes the beginning bearing rod for transmitting alloy wire, connector, and be set on wall, end
Bearing rod and at least one intermediate bar, the beginning bearing rod, at least one described intermediate bar and the end bearing rod are along water
It puts down to being sequentially arranged;The intermediate bar is flexible mast;
The fence alloy wire states beginning bearing rod, at least one described intermediate bar and institute described in being horizontally sequentially connected
End bearing rod is stated, and one end close to the beginning bearing rod of the fence alloy wire passes through described in connector connection
One end of alloy wire is transmitted, the other end of the transmission alloy wire connects the power output component.
Optionally, the detection device further includes remote control equipment, the detection host and the remote control equipment communication connection;
The remote control equipment is used to send high-voltage trigger signal or low pressure trigger signal to the detection host;
The detection host is used for when receiving the high-voltage trigger signal, sets high for the voltage peak parameter
Voltage crest value;And: when receiving the low pressure trigger signal, peak suction is set by the voltage peak parameter.
Optionally, the monitoring device is also used to after receiving the exception information, implements at least one of:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include with down toward
It is one of few: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding alarm of the exception information at least one described in electronic map
Information.
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud to put down
Platform;
Recognition of face is carried out in the acquisition image.
According to the fourth aspect of the invention, a kind of electronic equipment, including memory and processor are provided;
The memory, for storing the executable instruction of the processor;
The processor is configured to be related to via the execution executable instruction to execute first aspect and its optinal plan
Boundary defence monitoring method.
According to the fifth aspect of the invention, a kind of storage medium is provided, computer program is stored thereon with, feature exists
In the monitoring method for the boundary defence that realization first aspect and its optinal plan are related to when the program is executed by processor.
Monitoring method, device and the system of boundary defence provided by the invention adopt image using image collecting device
Collection, the expansible basis for implementing prevention, wherein the present invention can be simultaneously using the detection result of image and fence as in fact
The basis of boundary defence is applied, content is more various.Meanwhile acquired image is directed to exception information and determination, it can
Be conducive to image needed for pointedly searching boundary defence.
Meanwhile in the present invention, due to image collecting device and detection device be the equipment of security area need to be set, and
Monitoring device, which may not need, is arranged in security area, in turn, the present invention can be conducive to only by the network architecture of two-stage come
Meet communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, the present invention
It can be conducive to improve communication efficiency, reduce the generation of delay, promote real-time, in turn, can also be convenient for the management of monitoring device
The expansion of ability.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the monitoring method of boundary defence in one embodiment of the invention;
Fig. 2 is the flow diagram one of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 3 is the flow diagram two of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 4 is the flow diagram three of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 5 is the flow diagram four of the monitoring method of boundary defence in another embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the monitoring device of boundary defence in one embodiment of the invention;
Fig. 7 is the structural schematic diagram of the monitoring device of boundary defence in another embodiment of the present invention;
Fig. 8 is the structural schematic diagram of the monitoring system of boundary defence in one embodiment of the invention;
Fig. 9 is the structural schematic diagram of the monitoring system of boundary defence in another embodiment of the present invention;
Figure 10 is the structural schematic diagram of the monitoring system of boundary defence in yet another embodiment of the invention;
Figure 11 is the structural schematic diagram of detection device in one embodiment of the invention;
Figure 12 is the structural schematic diagram of detection device in another embodiment of the present invention;
Figure 13 is the structural schematic diagram of electronic equipment in one embodiment of the invention.
Description of symbols:
1- detection device;
101- detects host;
102- power output component;
103- transmits alloy wire;
104- fence alloy wire;
The beginning 105- bearing rod;
The end 106- bearing rod;
107- intermediate bar;
108- connector;
109- warning sign;
110- connector;
111- collector;
Bearing rod among 112-;
113- insulator;
114- arrester;
The monitoring device of 200- boundary defence;
201- receiving module;
202- determining module;
203- image collection module;
204- face recognition module;
205- alert process module;
206- electronic map processing module;
207- cloud platform sending module;
3- image collecting device;
4- warning device;
5- cloud platform;
6- divides pocket.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to
Here the sequence other than those of diagram or description is implemented.In addition, term " includes " and " having " and their any deformation,
Be intended to cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, product or setting
It is standby those of to be not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for these mistakes
The intrinsic other step or units of journey, method, product or equipment.
Technical solution of the present invention is described in detail with specifically embodiment below.These specific implementations below
Example can be combined with each other, and the same or similar concept or process may be repeated no more in some embodiments.
Fig. 1 is the flow diagram of the monitoring method of boundary defence in one embodiment of the invention.
Referring to FIG. 1, the monitoring method of boundary defence, is applied to monitoring device, comprising:
S11: the exception information of at least one of N number of detection device detection device transmission is received.
The detection device may include fence, and fence can be regarded as to feed back when being broken into,
So that detection device can issue any device of exception information, meanwhile, detection device may also include detection host, detection
Host can be connect with fence, to issue exception information when fence is broken into.
In one of embodiment, the fence includes the electronic circuit for being connected with pulse electricity, the pulse electricity
Electrical parameter can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.Specifically, voltage peak is joined
Number can be set to high-pressure peak or peak suction, and high-pressure peak therein can be greater than 5000 volts, and the peak suction can be small
In 5000 volts.In concrete example, which be can be in 5000 volts to 10000 volts of section, and the peak suction can be with
It is 1500 volts or so.
In turn, user free switching mode, high pressure mode can produce peak value according to different needs as 5000-
The pulse of the high-pressure peak of 10000V, low-voltage can produce the pulse for the peak suction that peak value is 1500v or so.Specifically make
Used time, can daytime or have personnel near fence operation into being switched to the low-voltage that peak value of pulse is 1500V or so, this
Keep the pulse hitting dynamics of front end fence smaller, if can be restored to peak value of pulse is when night or vigilant higher safety
The high pressure mode of 5000-10000V.
In one of embodiment, pulse electricity can be scanned for 60 times for example per minute, other than detection effect itself, also
Invader can be made to be difficult to climb up and over, further its effect for arriving safety guarantee.Specifically, when invader's climbing or destruction fence
Pulse electric shock can be generated to it, further, the defeated of warning message can be led under the abnormal conditions such as electric shock, short circuit and open circuit
Out.
Exception information, it can be understood as generated when the detection device detects that circumference invades and by detection device
Any information issued is specifically as follows and generates when the electronic circuit in fence referred to above is broken into;It can
It is transmitted along with the location information and/or identification information of corresponding detection device.
In addition, the content that characterization circumference invades can be multiplicity according to the difference of used detection device, it should
Different detection devices, can also such as infrared emission, vibration optical cable, leakage cable etc..As it can be seen that being visited involved in the present embodiment
Survey means are not limited to fence, may also include it is above done enumerate, no matter that is, using which kind of detection means, as long as realizing
The description of step S11 and step S12 just do not depart from the description range of method involved in the present embodiment.
S12: according to the exception information, at least one described corresponding M image collecting device of detection device is determined.
M image collecting device, it can be understood as be the image for acquiring region locating at least one described detection device
Image collecting device, it is seen then that the corresponding relationship of detection device and image collecting device is according to fence in detection device
What position and/or shooting angle of position and image collecting device etc. determined, meanwhile, which is not intended to limit quantity,
Such as: a detection device can correspond to one or more image collecting devices, and an image collecting device can also correspond to one
A or multiple detection devices.
It determines the process of M image collecting device, also may be, for example, the identification information for getting M image collecting device
And/or location information.
Image collecting device, it can be understood as arbitrarily can be realized the device of Image Acquisition, which can be scattered
Photo, or continuous video, in specific implementation process, the image collecting device for example can for video camera, camera,
Camera etc. also for example can be the mobile phone for having image collecting function, computer etc..
S13: the acquisition image of the M image collecting device is obtained.
The process for obtaining acquisition image then can receive Image Acquisition for example including acquisition request is sent to image collecting device
The acquisition image that device is sent according to acquisition request.In a kind of embodiment, element of time can be also carried in the acquisition request,
In turn, image collecting device can send particular point in time or the acquisition image of period according to element of time.
The monitoring method of boundary defence provided in this embodiment, the acquisition using image collecting device to image are expansible
Implement the basis of prevention, wherein the present embodiment can be anti-using the detection result of image and fence as circumference is implemented simultaneously
The basis of model, content are more various.Meanwhile acquired image is directed to exception information and determination, can be conducive to needle
Image needed for searching property boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in,
And monitoring device may not need and security area is arranged in, in turn, the present invention can be conducive to the only network architecture by two-stage
Meet communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this reality
Applying example can be conducive to improve communication efficiency, reduce the generation of delay, promote real-time, in turn, can also be convenient for monitoring device
The expansion of managerial ability.
Fig. 2 is the flow diagram one of the monitoring method of boundary defence in another embodiment of the present invention.
Referring to FIG. 2, after step s 13, may also include step S13: carrying out recognition of face in the acquisition image.
By recognition of face, the identity information of the available personnel to the personnel or neighbouring position that invade, in turn,
It can be conducive to the identity of the personnel invaded to related personnel's feedback output, and: it is selected in time to be convenient for checking intrusion
The Security Personnel of position actual conditions is convenient for further monitoring management.Such as: if the personnel invaded are security personnel,
It can not then be handled, if the personnel invaded are non-resident, non-trade company, either for such as wanted criminal, habitual offender or
The member etc. of the blacklist prestored then can further trigger the function such as local alarm, platform alarm, public security alarm.
As it can be seen that introducing of the present embodiment by recognition of face, so that the basis for security protection further comprises face
Identification as a result, or be interpreted as identity information, can be convenient for more accurately carrying out safeguard management.
Fig. 3 is the flow diagram two of the monitoring method of boundary defence in another embodiment of the present invention.
After step s 11, may also include step S15: it is corresponding that control warning device externally exports the exception information
Warning message.
The warning message can be any information triggered by exception information, according to the difference of warning device, form
It can be multiplicity, such as: the warning device includes at least one of: display, sound-light alarm component, audible alarm group
Part, luminescence component.If display, then the warning message can be any information shown suitable for display, for example, notify,
Image, text etc., if sound-light alarm component, then the warning message can be to combine sound and luminous any information,
Such as by voice broadcast special sound content, it is simultaneously emitted by the light of specific frequency and/or color;If luminescence component, then should
Warning message can be any information based on luminous characterization alarm;Wherein it is possible to specific luminous frequency and/or color table
Sign, can also by the way that luminous luminescence unit occurs in luminescence component, which is is characterized, also may be, for example, characterization different function
Different indicator lights.
The warning device may be disposed at detection device neighbouring position, to carry out alarm to the personnel invaded, can also set
It is placed near monitoring device, or is set in the carry-on equipment of each security personnel, as long as realizing alarm, do not depart from this reality
Apply the description of example.
In specific implementation process, which can also change according to the difference of exception information, for example, not same district
The exception information of the detection device in domain, producing cause difference of exception information etc. can produce different warning messages, therein
Sound that different warning messages can be for example different, different luminescence units, different luminous frequencies, different images, difference
Text etc..
Whether in addition, step S15 can be implemented any time after step s 11, and it is real to be not only restricted to other steps
It applies, and whether finished.
Fig. 4 is the flow diagram three of the monitoring method of boundary defence in another embodiment of the present invention.
Referring to FIG. 4, step S16: described in the corresponding position of detection device is shown at least one described in electronic map
The corresponding warning message of exception information.
Electronic map, it will be appreciated that for the map that corresponding to boundary defence can be built situation and be characterized, can be
Two-dimensional map, or three-dimensional map, fineness and modeling source, all can be arbitrary, according to need at that time
Asking arbitrarily to change.
Meanwhile detection device can have been characterized in electronic map, it can not also characterize, in turn, when needing display alarm information, only
Warning message need to be shown in corresponding position.
In specific implementation process, main architectural plane position can be clearly indicated in electronic map and respectively set up defences a position and
Number, will not wear, and the states such as the operation of energy display system, Defence areas alarm, normal and failure.
Content in relation to warning message can refer to associated description understanding above, specifically, using display electronic map
Display shows the warning message.
By embodiment of above, related personnel can be conducive to and accurately learn the position being abnormal.
Fig. 5 is the flow diagram four of the monitoring method of boundary defence in another embodiment of the present invention.
Referring to FIG. 5, may also include step S16 after step S11: at least one the exception information, described are detected
The identification information and/or location information of device are sent to cloud platform.It, can also be by institute meanwhile after getting the acquisition image
It states acquisition image and is sent to the cloud platform.
In turn, cloud platform can record the information received, convenient for checking and tracing later.Can also it be convenient for simultaneously
Cloud platform carries out further intellectual analysis.
It, can also be before sending to abnormal personnel therein if acquisition image is sent to cloud platform in specific implementation process
It is marked, cloud platform can be in the case where receiving multiple labels has abnormal personnel, by the correlation of exception personnel
Message identification is the member of blacklist, in turn, if can trigger specific in the member for identifying blacklist in conjunction with step S14
Default alarm, the default alarm can be issued using alarm device or electronic map referred to above.
As it can be seen that the monitoring method of boundary defence provided in this embodiment, the acquisition using image collecting device to image, it can
The basis of prevention is implemented in extension, wherein the present embodiment can be simultaneously using the detection result of image and fence as implementation week
The basis of boundary's prevention, content are more various.Meanwhile acquired image is directed to exception information and determination, it can be advantageous
The image needed for pointedly searching boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in,
And monitoring device may not need and security area is arranged in, in turn, the present embodiment can be conducive to the only network rack by two-stage
Structure meets communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this
Embodiment can be conducive to improve communication efficiency, reduce the generation of delay, and monitoring device can be also convenient in turn by promoting real-time
Managerial ability expansion.
Fig. 6 is the structural schematic diagram of the monitoring device of boundary defence in one embodiment of the invention.Fig. 7 is another reality of the present invention
Apply the structural schematic diagram of the monitoring device of boundary defence in example.
Please refer to Fig. 6 and Fig. 7, the monitoring device 200 of boundary defence, comprising:
Receiving module 201, for receiving the exception information of at least one of N number of detection device 1 detection device 1 transmission;Institute
Stating exception information is generated when detecting that circumference invades;
Determining module 202, for determining at least one described detection device 1 corresponding M figure according to the exception information
As acquisition device 3;The M image collecting device 3 is the figure for acquiring the image in region locating at least one described detection device 3
As acquisition device 3;
Image collection module 203, for obtaining the acquisition image of the M image collecting device 3.
The monitoring device of boundary defence involved in the present embodiment can be used for implementing the boundary defence of embodiment illustrated in fig. 1
Monitoring method, technological means, technical effect and optional embodiment can refer to the associated description of embodiment illustrated in fig. 1
Understand.
Optionally, the detection device includes fence, and the fence includes the electronic circuit for being connected with pulse electricity,
The electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes the voltage peak parameter of the pulse electricity.
Optionally, the monitoring device 200 of the boundary defence, further includes:
Alert process module 205 externally exports the corresponding warning message of the exception information for controlling warning device 4;
The warning device 4 includes at least one of: display, sound-light alarm component, audible alarm component, luminescence component;
It is aobvious to be used for the corresponding position of detection device 1 at least one described in electronic map for electronic map processing module 206
Show the corresponding warning message of the exception information;
Cloud platform sending module 207, for by the identification information of at least one the exception information, described detection device 1
And/or location information is sent to cloud platform 5, and and: after getting the acquisition image, the acquisition image is sent to institute
State cloud platform 5.
As it can be seen that the monitoring device of boundary defence provided in this embodiment, the acquisition using image collecting device to image, it can
The basis of prevention is implemented in extension, wherein the present embodiment can be simultaneously using the detection result of image and fence as implementation week
The basis of boundary's prevention, content are more various.Meanwhile acquired image is directed to exception information and determination, it can be advantageous
The image needed for pointedly searching boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in,
And monitoring device may not need and security area is arranged in, in turn, the present embodiment can be conducive to the only network rack by two-stage
Structure meets communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this
Embodiment can be conducive to improve communication efficiency, reduce the generation of delay, and monitoring device can be also convenient in turn by promoting real-time
Managerial ability expansion.
Fig. 8 is the structural schematic diagram of the monitoring system of boundary defence in one embodiment of the invention.
Referring to FIG. 8, the monitoring system of boundary defence, comprising: monitoring device 2, multiple detection devices 1 are adopted with multiple images
Acquisition means 3;The monitoring device 2 respectively with the detection device 1 and 3 communication connection of image collecting device;The detection device 1
Including fence and detection host 101.
Monitoring device 2, detection device 1 and image collecting device 3 referred to above, can refer to preceding method embodiment
Associated description understands.
The detection device 1, for generating exception information when detecting that circumference invades, and to the monitoring device
3 send the exception information.
The monitoring device 2, for receiving the exception information of at least one of N number of detection device 1 detection device 1 transmission,
According to the exception information, at least one described corresponding M image collecting device 3 of detection device 1 is determined, and: obtain institute
State the acquisition image of M image collecting device 3;The M image collecting device 3 is to acquire at least one described detection device 1
The image collecting device of the image in locating region.
In one of embodiment, as illustrated in preceding method embodiment, the detection device includes detection master
Machine and fence, the fence may include the electronic circuit including being connected with pulse electricity, and the detection host 101 is used for
The exception information is sent to the monitoring device when the fence detects that circumference is invaded, and: control pair
The electrical parameter of the electricity of pulse provided by the electronic circuit answered, the electrical parameter include voltage peak parameter.
In specific implementation process, the detection host 101 is specifically used for controlling pulse provided by corresponding electronic circuit
The voltage peak parameter of electricity is high-pressure peak or peak suction, and the high-pressure peak is greater than 5000 volts, and the peak suction is less than
5000 volts.Such as high-pressure peak may be in 5000 volts to 10000 volts of section, peak suction can be 1500 volts or so.
Fig. 9 is the structural schematic diagram of the monitoring system of boundary defence in another embodiment of the present invention.
Referring to FIG. 9, the monitoring device, is also used to after receiving the exception information, implement it is following at least it
One:
Control warning device 4 externally exports the corresponding warning message of the exception information;The warning device 4 includes following
At least one: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device 1 shows the corresponding alarm of the exception information at least one described in electronic map
Information;
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud to put down
Platform 5;
Recognition of face is carried out in the acquisition image.
Above functions can refer to step S14, S15 and the associated description of step S16 in embodiment of the method and understand,
It is applicable to any optional means of implementation steps S14 to the relevant implementation process of step S16.
In one of embodiment, monitoring device 2 can also connect iversion controller 6, and the quantity of iversion controller 6 can be individually,
It is also possible to multiple, in turn, the control of external server, unit is received using iversion controller 6, for example, may be in response to point
The control of device is controlled, realizes deploying to ensure effective monitoring and control of illegal activities, removing the functions such as control, setting high-pressure peak, setting peak suction for detection device 1.
In specific citing, the present embodiment can be by passing through RS485, CAN bus technology or base for the detection device 1 of circumference
It is connected to monitoring device 2 in TCP/IP network technology, and then the control to front end detection device 1 can be realized by monitoring device 2,
The alarm signal of front-end detector is obtained, then by image collecting device 3, gets 1 associated images acquisition device of detection device
Image, specifically also interception image and can identify wherein face information, recognition result is recorded and passes through language together with warning message
Sound synthesis mode is broadcasted, and notifies the management and monitoring device 2 of Security Personnel.
As it can be seen that the present embodiment optinal plan can support alarm cloud computing service, cloud management is realized by IOT technology.
Meanwhile recognition of face, speech recognition, speech synthesis technique can be also applied to boundary defence field, and use embedded architecture,
System energy consumption is reduced relative to traditional PC platform.
Figure 10 is the structural schematic diagram of the monitoring system of boundary defence in yet another embodiment of the invention.
Referring to FIG. 10, the quantity of monitoring device 2 can be multiple, and then, it can be achieved that variant monitoring device integration
Management, meanwhile, by taking related blacklist above as an example, it is sent to cloud platform after 2 identification of monitoring device, and through cloud
After platform is determined as black list member, which can be updated to each monitoring device 2 by one of any monitoring device 2,
That is: the black list member that monitoring device 2 is also used to receive cloud platform transmission updates information update local blacklist, and according to current
Local blacklist export warning information, such as: the corresponding particular alert information of output black list member can be default
's.
Figure 11 is the structural schematic diagram of detection device in one embodiment of the invention;Figure 12 is visited in another embodiment of the present invention
Survey the structural schematic diagram of device.
Figure 11 and Figure 12 are please referred to, the detection device further includes power output component 102, and the electronic circuit includes enclosing
Column alloy wire 104, power output component 102 described in 104 direct or indirect connection of fence alloy wire, the pulse electricity be by
It is provided to the fence alloy wire 103, the detection host 101 connects the power output component 102, to pass through the electricity
Energy output precision 102 controls the electrical parameter of the pulse electricity of corresponding fence alloy wire 103.
Power output component 102 can be provided for example comprising each positive output interface and negative output interface, and ground connection mouth
Electric energy can be and received from source side, for example, each positive output interface is connected directly or indirectly to a rhizosphere column alloy
Line 104 does not depart from the description of the present embodiment as long as realizing the output of electric energy.
In one of embodiment, the detection device 1 further includes transmission alloy wire 103, connector 108, Yi Jishe
Beginning bearing rod 105, end bearing rod 106 and at least one intermediate bar 107 being placed on wall, the beginning bearing rod 105,
At least one described intermediate bar 107 is horizontally sequentially arranged with the end bearing rod 106;The intermediate bar 107 is flexibility
Mast, bearing rod can be the bar of rigidity.The fence alloy wire 104 states beginning bearing rod described in being horizontally sequentially connected
105, at least one described intermediate bar 107 and the end bearing rod 106, and the close beginning of the fence alloy wire 104
One end of bottom bearing bar 105 connects one end of the transmission alloy wire 103, the transmission alloy wire by the connector 108
103 other end connects the power output component 102.
Since intermediate bar 107 is flexible link, the weight of human body is not supported with alloy wire, the personnel of further avoiding climb
A possibility that climbing improves safety protection function.Meanwhile can be conducive to perceive the invasion of invader again, and issue alarm signal, really
Insurance system it is safe and reliable.
In concrete example, intermediate bar 107 can be the flexible PV mast of fence.
In specific implementation process, detection device 1, may also include that warning sign 109, another connector 110, collector 111,
Intermediate bearing rod 112, insulator 113 and arrester 114.
Wherein, one end by proximal end bearing rod 106 of fence alloy wire 104 can connect centre by connector 110 and connect
Wiring, and then other fence alloy wires are connected to by intermediate connections and another connector 110.Fence alloy wire 104 can lead to
It crosses insulator 113 and connects intermediate bar 107.
Fence alloy wire 104 can also be connected with the warning sign 109 and collector 111.
In addition, can also be equipped with intermediate bearing rod 112 between beginning bearing rod 105 and end bearing rod 106.Intermediate bearing rod
112 can also be on connecting wall.Arrester 114 can be also connected between beginning bearing rod 105 and fence alloy wire 104.
In the specific implementation process, Figure 11 is please referred to, a detection host 101 can correspond to power output component 102
One group of fence alloy wire corresponds to a pair of of beginning bearing rod 105 and end bearing rod 106;In other implementation processes, it please join
Figure 12 is examined, a detection host 101 and power output component 102 can correspond to more than one set group fence alloy wire, that is, correspond to
More than a pair of beginning bearing rod 105 and end bearing rod 106.
In one of embodiment, the detection device 1 further includes remote control equipment, the detection host 101 with it is described
Remote control equipment communication connection.
The remote control equipment is used to send high-voltage trigger signal or low pressure trigger signal to the detection host;
The detection host 101 is used for when receiving the high-voltage trigger signal, by the voltage peak parameter setting
For high-pressure peak;And: when receiving the low pressure trigger signal, peak suction is set by the voltage peak parameter.
Wherein, remote control equipment can be used for carrying for personnel, in turn, can be convenient for the practical control at scene.
In addition, the remote control equipment is also used to send deployment trigger signal or trigger signal of withdrawing a garrison to the detection host.
The detection host 101 be used for receive it is described withdraw a garrison trigger signal when, control power output component 102 stops
Export pulse electricity;And: when receiving the deployment trigger signal, control power output component 102 starts to export pulse electricity.
As it can be seen that by remote control equipment, the control that high pressure may be implemented, low pressure, withdraw a garrison, deploy troops on garrison duty etc..
The monitoring system of boundary defence provided in this embodiment, the acquisition using image collecting device to image are expansible
Implement the basis of prevention, wherein the present embodiment can be anti-using the detection result of image and fence as circumference is implemented simultaneously
The basis of model, content are more various.Meanwhile acquired image is directed to exception information and determination, can be conducive to needle
Image needed for searching property boundary defence.
Meanwhile in the present embodiment, since image collecting device and detection device are that the equipment of security area need to be arranged in,
And monitoring device may not need and security area is arranged in, in turn, the present embodiment can be conducive to the only network rack by two-stage
Structure meets communication need, compared to it is existing in the related technology using detector, controller, management software three-tier architecture, this
Embodiment can be conducive to improve communication efficiency, reduce the generation of delay, and monitoring device can be also convenient in turn by promoting real-time
Managerial ability expansion.
Figure 13 is the structural schematic diagram of electronic equipment in one embodiment of the invention.
Figure 13 is please referred to, electronic equipment 70 may include memory 72 and processor 71.
The memory 72, for storing the executable instruction of the processor 71.
The processor 71 is configured to execute week involved in the above optinal plan via the executable instruction is executed
The monitoring method of boundary's prevention.
The present embodiment additionally provides a kind of storage medium, is stored thereon with computer program, which is executed by processor
The monitoring method for the boundary defence that Shi Shixian or more optinal plan is related to.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to
The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey
When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or
The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of monitoring method of boundary defence is applied to monitoring device characterized by comprising
Receive the exception information of at least one of N number of detection device detection device transmission;The exception information is in the detection
Device, which detects, to be generated when circumference invades;
According to the exception information, at least one described corresponding M image collecting device of detection device is determined;The M figure
As the image collecting device that acquisition device is the image in region locating for detection device at least one described in acquisition;
Obtain the acquisition image of the M image collecting device.
2. the electronics encloses the method according to claim 1, wherein the detection device includes fence
Column includes the electronic circuit for being connected with pulse electricity, and the electrical parameter of the pulse electricity can be adjusted, and the electrical parameter includes institute
State the voltage peak parameter of pulse electricity.
3. method according to claim 1 or 2, which is characterized in that receive at least one of N number of detection device detection device
Further include at least one of after the exception information of transmission:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include it is following at least it
One: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding warning message of the exception information at least one described in electronic map;
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud platform;
After getting the acquisition image, the acquisition image is sent to the cloud platform;
Recognition of face is carried out in the acquisition image.
4. a kind of monitoring device of boundary defence characterized by comprising
Receiving module, for receiving the exception information of at least one of N number of detection device detection device transmission, the exception information
It is to be generated when the detection device detects that circumference invades;
Determining module, for determining at least one described corresponding M image collector of detection device according to the exception information
It sets;The M image collector is set to the image collecting device for acquiring the image in region locating at least one described detection device;
Image collection module, for obtaining the acquisition image of the M image collecting device.
5. a kind of monitoring system of boundary defence characterized by comprising monitoring device, multiple detection devices and multiple images
Acquisition device;The monitoring device respectively with the detection device and image collecting device communication connection;
The detection device is sent for generating exception information when detecting that circumference invades, and to the monitoring device
The exception information;
The monitoring device, for receiving the exception information of at least one of N number of detection device detection device transmission, according to described
Exception information determines at least one described corresponding M image collecting device of detection device, and: it obtains the M image and adopts
The acquisition image of acquisition means;The M image collector is set to the image for acquiring region locating at least one described detection device
Image collecting device.
6. system according to claim 5, which is characterized in that the detection device includes detecting host and fence,
The fence includes the electronic circuit for being connected with pulse electricity, and the detection host is used to detect circumference in the fence
The exception information is sent to the monitoring device when invading, and: control pulse provided by corresponding electronic circuit
The electrical parameter of electricity, the electrical parameter includes voltage peak parameter.
7. system according to claim 6, which is characterized in that the detection host is specifically used for controlling corresponding electric wire
The voltage peak parameter of the electricity of pulse provided by road is high-pressure peak or peak suction, and the high-pressure peak is greater than 5000 volts, institute
Peak suction is stated less than 5000 volts.
8. system according to claim 6 or 7, which is characterized in that the detection device further includes power output component, institute
Stating electronic circuit includes fence alloy wire, power output component described in the fence alloy wire direct or indirect connection, the arteries and veins
Punching electricity is provided to the fence alloy wire, and the detection host connects the power output component, to pass through the electricity
Energy output precision controls the electrical parameter of the pulse electricity of corresponding fence alloy wire;
The detection device further includes transmission alloy wire, connector, and the beginning bearing rod, the end load that are set on wall
Bar and at least one intermediate bar, the beginning bearing rod, at least one described intermediate bar and the end bearing rod are horizontally
It is sequentially arranged;The intermediate bar is flexible mast;
The fence alloy wire states beginning bearing rod, at least one described intermediate bar and the end described in being horizontally sequentially connected
Bottom bearing bar, and one end close to the beginning bearing rod of the fence alloy wire connects the transmission by the connector
The other end of one end of alloy wire, the transmission alloy wire connects the power output component.
9. system according to claim 6 or 7, which is characterized in that the detection device further includes remote control equipment, the spy
Survey host and the remote control equipment communication connection;
The remote control equipment is used to send high-voltage trigger signal or low pressure trigger signal to the detection host;
The detection host is used for when receiving the high-voltage trigger signal, sets high voltage crest for the voltage peak parameter
Value;And: when receiving the low pressure trigger signal, peak suction is set by the voltage peak parameter.
10. according to the described in any item systems of claim 5 to 7, which is characterized in that the monitoring device is also used to receiving
To after the exception information, implement at least one of:
Control warning device externally exports the corresponding warning message of the exception information;The warning device include it is following at least it
One: display, sound-light alarm component, audible alarm component, luminescence component;
The corresponding position of detection device shows the corresponding warning message of the exception information at least one described in electronic map;
The identification information of at least one the exception information, described detection device and/or location information are sent to cloud platform;
Recognition of face is carried out in the acquisition image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910045715.1A CN109658648A (en) | 2019-01-17 | 2019-01-17 | Monitoring method, device and the system of boundary defence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910045715.1A CN109658648A (en) | 2019-01-17 | 2019-01-17 | Monitoring method, device and the system of boundary defence |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109658648A true CN109658648A (en) | 2019-04-19 |
Family
ID=66119837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910045715.1A Pending CN109658648A (en) | 2019-01-17 | 2019-01-17 | Monitoring method, device and the system of boundary defence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109658648A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111784987A (en) * | 2020-07-13 | 2020-10-16 | 广元量知汇科技有限公司 | Intelligent security alarm system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136174A (en) * | 2011-03-30 | 2011-07-27 | 吴洪伟 | Multi-defence area electronic perimeter and protection method thereof |
US20130188044A1 (en) * | 2012-01-19 | 2013-07-25 | Utechzone Co., Ltd. | Intelligent monitoring system with automatic notification and intelligent monitoring device thereof |
CN203503089U (en) * | 2013-10-12 | 2014-03-26 | 大连华悦电子有限公司 | Peripheral alarming and precaution linkage system |
CN204576718U (en) * | 2015-04-29 | 2015-08-19 | 北京欣秦林科技发展有限公司 | A kind of pulse electronic fence perimeter alarm system |
CN107993385A (en) * | 2017-12-29 | 2018-05-04 | 上海誉浩信息技术有限公司 | A kind of intelligence perimeter alarm intruder detection system and its detection method |
CN108986364A (en) * | 2018-08-28 | 2018-12-11 | 苏州三股道信息科技有限公司 | Perimeter security crime prevention system and method |
-
2019
- 2019-01-17 CN CN201910045715.1A patent/CN109658648A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136174A (en) * | 2011-03-30 | 2011-07-27 | 吴洪伟 | Multi-defence area electronic perimeter and protection method thereof |
US20130188044A1 (en) * | 2012-01-19 | 2013-07-25 | Utechzone Co., Ltd. | Intelligent monitoring system with automatic notification and intelligent monitoring device thereof |
CN203503089U (en) * | 2013-10-12 | 2014-03-26 | 大连华悦电子有限公司 | Peripheral alarming and precaution linkage system |
CN204576718U (en) * | 2015-04-29 | 2015-08-19 | 北京欣秦林科技发展有限公司 | A kind of pulse electronic fence perimeter alarm system |
CN107993385A (en) * | 2017-12-29 | 2018-05-04 | 上海誉浩信息技术有限公司 | A kind of intelligence perimeter alarm intruder detection system and its detection method |
CN108986364A (en) * | 2018-08-28 | 2018-12-11 | 苏州三股道信息科技有限公司 | Perimeter security crime prevention system and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111784987A (en) * | 2020-07-13 | 2020-10-16 | 广元量知汇科技有限公司 | Intelligent security alarm system |
CN111784987B (en) * | 2020-07-13 | 2021-03-23 | 深圳智乐未来机器人技术有限公司 | Intelligent security alarm system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN202196177U (en) | Circuit monitoring system | |
CN205193981U (en) | Radar vision fuses intelligent warning system with low misstatement rate | |
CN104317918B (en) | Abnormal behaviour analysis and warning system based on compound big data GIS | |
CN104537788A (en) | High voltage electric transmission line external damage-proof intelligent image pre-warning system and method | |
CN108665656A (en) | A kind of power station intrusion preventing alarm system | |
CN202268048U (en) | Security monitoring system | |
CN100470595C (en) | Circumference all-weather defence system | |
CN208903386U (en) | Intrusion alarm equipment and system | |
CN104464138A (en) | Solar multiplex recognition anti-theft monitoring early warning system low in power consumption | |
CN108806144A (en) | A kind of community alarm system based on 5G networks | |
CN110827500B (en) | Intelligent security method and system | |
CN105389962A (en) | One-key alarm system based on mobile intelligent terminals | |
CN103227916A (en) | Backup method, device and system of monitoring video | |
CN109658648A (en) | Monitoring method, device and the system of boundary defence | |
CN208460141U (en) | Forbidden zone intrusion alarm system | |
CN208819329U (en) | A kind of safety supervision system being able to carry out positioning early warning in real time | |
CN103745543A (en) | A high-voltage pulse electronic fence | |
CN105844821A (en) | Transformer field anti-theft monitoring device and method | |
CN211710855U (en) | Unmanned autonomous comprehensive alarm system | |
CN105608818A (en) | Intelligent anti-invasion safety monitoring equipment based on Internet of Things | |
CN213211330U (en) | Detection system of fire fighting access | |
CN205428082U (en) | Intelligence prevents invading safety monitoring device based on thing networking | |
CN107633631B (en) | Boundary monitoring method with obstacle and control equipment | |
CN206557937U (en) | Intelligent external force damage prevention power transmission line monitoring device based on video monitoring | |
CN206024005U (en) | A kind of Active Eyes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190419 |