CN110874906B - Method and device for starting defense deploying function - Google Patents

Method and device for starting defense deploying function Download PDF

Info

Publication number
CN110874906B
CN110874906B CN201811028668.1A CN201811028668A CN110874906B CN 110874906 B CN110874906 B CN 110874906B CN 201811028668 A CN201811028668 A CN 201811028668A CN 110874906 B CN110874906 B CN 110874906B
Authority
CN
China
Prior art keywords
distance
function
image
starting
line
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811028668.1A
Other languages
Chinese (zh)
Other versions
CN110874906A (en
Inventor
谢肖斌
薛智虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision System Technology Co Ltd
Original Assignee
Hangzhou Hikvision System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision System Technology Co Ltd filed Critical Hangzhou Hikvision System Technology Co Ltd
Priority to CN201811028668.1A priority Critical patent/CN110874906B/en
Publication of CN110874906A publication Critical patent/CN110874906A/en
Application granted granted Critical
Publication of CN110874906B publication Critical patent/CN110874906B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction

Abstract

The disclosure relates to a method and a device for starting a defense deploying function, and belongs to the technical field of security and protection. The method comprises the following steps: receiving an instruction for starting a defense deploying function; acquiring an image shot by monitoring equipment, and analyzing the image to obtain an analysis result; and when the analysis result meets the preset condition of starting the defense deploying function, starting the defense deploying function. By adopting the method and the device, the defense deploying function can not be started when the relevant personnel have not left the monitoring place, and the defense deploying function can not be started when the relevant personnel have left the monitoring place for a period of time, so that the time for starting the defense deploying function is more in line with the actual requirement.

Description

Method and device for starting defense deploying function
Technical Field
The disclosure relates to the technical field of security protection, in particular to a method and a device for starting a defense deploying function.
Background
Along with the development of society, the demand of people for public security is higher and higher. In some monitoring places (such as banks, jewelry stores and the like), no person on duty is left in the monitoring places for watching after the time on duty. For example, after 5 pm, all personnel in the bank are off duty, including on-site security personnel. At this time, delayed defense deployment is required for the monitored site.
The delayed arming is to start the arming function after a preset time. For example, a bank-related person operates and starts the delayed defense function in a computer device, the computer device counts down, and after 30 seconds, the defense function is automatically started. After the defense deploying function is started, security check equipment such as infrared equipment near the entrance guard emits infrared rays, and the projection of the infrared ray beams on the ground can be called an alarm detection line. When a person crosses the alarm detection line, the infrared ray can be shielded, so that the infrared equipment can detect the entrance of the person, and further can perform alarm processing. In the process, the reason for delay defense deployment is that a certain delay is left for relevant personnel to go out of a monitoring place after operating computer equipment, so that false alarm caused by the fact that the security inspection equipment detects the relevant personnel is avoided.
In carrying out the present disclosure, the inventors found that at least the following problems exist:
the time delay duration in the time delay defense deployment is difficult to set. If the setting is short, related personnel do not leave the monitoring place, the defense deploying function is started, and further false alarm is generated because the security inspection equipment detects the related personnel. If the setting is long, the related personnel have already walked out of the monitoring place for a period of time, and the defense function has not been started, and the time gap can be utilized by lawbreakers. There is no effective mechanism to solve the above problems.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides the following technical solutions:
according to a first aspect of an embodiment of the present disclosure, there is provided a method for starting a defense function, the method including:
receiving an instruction for starting a defense deploying function;
acquiring an image shot by monitoring equipment, and analyzing the image to obtain an analysis result;
and when the analysis result meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, the acquiring an image captured by a monitoring device, and analyzing the image to obtain an analysis result includes:
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image;
when the analysis result meets the preset condition of starting the defense deploying function, the defense deploying function is started, and the method comprises the following steps:
and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the starting the arming function includes:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the preset distance threshold value is determined based on the distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of a corresponding actual line in the image between the alarm detection line and the monitoring equipment.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the starting the arming function includes:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the starting the arming function includes:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, acquiring an image captured by the monitoring device, and analyzing the image to obtain an analysis result, including:
acquiring an image shot by monitoring equipment, and identifying the number of people in the image;
when the analysis result meets the preset condition of starting the defense deploying function, the defense deploying function is started, and the method comprises the following steps:
and when the number of the people in the image is larger than a preset number threshold, starting a defense deploying function.
Optionally, the preset distance threshold is a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, or a sum of a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image and a preset distance value.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for turning on a arming function, the apparatus comprising:
the receiving module is used for receiving an instruction for starting the defense deploying function;
the analysis module is used for acquiring images shot by the monitoring equipment and analyzing the images to obtain analysis results;
and the defense deploying module is used for starting the defense deploying function when the analysis result meets the preset condition of starting the defense deploying function.
Optionally, the analysis module is configured to:
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image;
when the analysis result meets the preset condition of starting the defense deploying function, the defense deploying function is started, and the method comprises the following steps:
and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, the analysis module is configured to:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the preset distance threshold value is determined based on the distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of a corresponding actual line in the image between the alarm detection line and the monitoring equipment.
Optionally, the analysis module is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analysis module is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analysis module is configured to obtain an image captured by a monitoring device, and identify the number of people in the image;
the defense deploying module is used for starting a defense deploying function when the number of the people in the image is larger than a preset number threshold.
Optionally, the preset distance threshold is a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, or a sum of a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image and a preset distance value.
According to a third aspect of the embodiments of the present disclosure, there is provided a terminal comprising a processor, a communication interface, a memory, and a communication bus, wherein:
the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory is used for storing a computer program;
the processor is used for executing the program stored in the memory so as to realize the method for starting the defense function.
According to a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the method for opening a defense function described above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
by the method provided by the embodiment of the disclosure, the image shot by the monitoring equipment is analyzed to determine whether to start the defense deploying function, so that the defense deploying function can be prevented from being started by setting a fixed delay time to count down. The method provided by the embodiment can not start the defense deploying function when the related personnel have not left the monitoring place, and can not start the defense deploying function when the related personnel have left the monitoring place for a period of time, so that the time for starting the defense deploying function is more in line with the actual requirement.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a method of enabling a arming function according to an exemplary embodiment;
FIG. 2 is a schematic illustration of a monitoring location shown in accordance with an exemplary embodiment;
FIG. 3 is a schematic diagram illustrating a configuration of a device for initiating a arming function according to one exemplary embodiment;
fig. 4 is a schematic diagram illustrating a structure of a terminal according to an exemplary embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the disclosure provides a method for starting a defense deploying function, which can be realized by a terminal. The terminal can be a tablet computer, a desktop computer, a defense terminal and the like.
The terminal may include a processor, memory, etc. The processor, which may be a CPU (Central Processing Unit), may be used for analyzing the image, obtaining an analysis result, and the like. The Memory may be a RAM (Random Access Memory), a Flash (Flash Memory), and the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, and the like, such as a preset distance threshold.
The terminal may also include a transceiver, input components, display components, audio output components, and the like. The transceiver can be used for data transmission with the server and sending alarm information to the server, and the transceiver can comprise a Bluetooth component, a WiFi (Wireless-Fidelity) component, an antenna, a matching circuit, a modem and the like. The input means may be a touch screen, keyboard, mouse, etc. The audio output component may be a speaker, headphones, or the like.
An exemplary embodiment of the present disclosure provides a method for starting a defense function, as shown in fig. 1, a processing flow of the method may include the following steps:
step S110, receiving an instruction to start the arming function.
In implementation, after the duty time of the monitoring place is over, a related person can be left to trigger the starting of the defense function of the monitoring place. As shown in fig. 2, a terminal for triggering the opening of the arming function of the monitoring place may be disposed at a position a, a door is at a position B, and after the terminal triggers the opening of the arming function of the monitoring place, a relevant person needs to travel a distance to reach the position B where the door is located, and then exit from the door to the outside of the monitoring place. In the process that the relevant person reaches the position B where the door is located through a certain distance, the person needs to pass through a box-selected area, and the area is the defense area. If the defense function is immediately effective after the related personnel trigger the start of the defense function of the monitoring place, the related personnel can be detected by the security inspection equipment when passing through the defense area, and false alarm is generated. Therefore, it is necessary to wait for the relevant person to leave the defense area and then to enable the defense function.
When related personnel carry out triggering operation for starting the defense deploying function in the terminal, the terminal can receive an instruction for starting the defense deploying function.
And step S120, acquiring the image shot by the monitoring equipment, and analyzing the image to obtain an analysis result.
In implementation, the images captured by the monitoring device may be analyzed, such as a recognition process, a process of determining the position of a target person, and the like. After the images taken by the monitoring device are analyzed, corresponding analysis results can be obtained.
And step S130, when the analysis result meets the preset condition of starting the defense function, starting the defense function.
In implementation, when the analysis result meets a preset condition for starting the defense function, the defense function can be triggered to be started.
Alternatively, step S120 may include: the method includes the steps of obtaining an image shot through a monitoring device, and detecting the distance between the position of a target person and a preset reference line in the image. Step S130 may include: and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
In implementation, whether to turn on the arming function may be determined based on the distance between the position of the target person and a preset reference line of the image.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the step of starting the arming function may include: and if the detected distance is greater than a preset distance threshold value, starting the defense deploying function. The preset distance threshold is determined based on the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image, and the reference line is the edge line of the corresponding actual line in the image between the alarm detection line and the monitoring equipment.
After the defense deploying function is started, security check equipment such as infrared equipment near the entrance guard emits infrared rays, and the projection of the infrared ray beams on the ground can be called an alarm detection line. When a person crosses the alarm detection line, the infrared ray can be shielded, so that the infrared equipment can detect the entrance of the person, and further can perform alarm processing. Or, the monitoring device shoots an image in a monitoring place, and when the image includes a person image, alarm processing is performed, and corresponding actual lines closest to the entrance guard among four edges in an effective shooting area of the monitoring device may be called alarm detection lines.
Further, the reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference. The reference line may also be a line set by a user, and the user may input the position of the reference line in the image in the terminal, for example, the position of the reference line in the image by a slide selection operation, or the coordinates of the horizontal axis, the vertical axis, and the like of the reference line in the image. The terminal can acquire the position of the input reference line in the image, but requires that the actual line corresponding to the input reference line is positioned between the alarm detection line and the monitoring equipment.
In practice, as shown in fig. 2, a monitoring device may be located at location C, and the monitoring device may capture images of a scene over a large area within the monitored facility, such as an area of a defense. The monitoring device can shoot images in the monitoring place according to a preset period and send the shot images to the terminal. Further, the terminal can acquire images in the monitoring place. Then, the terminal may identify a target person in the acquired image, determine the position of the target person, and further may determine a distance between the position of the target person and a preset reference line.
The general certain position of fixed mounting of supervisory equipment on the wall that can then have installer adjustment supervisory equipment's shooting angle, can generally adjust supervisory equipment's shooting angle for can clapping the angle in the monitoring place most regional, still can adjust supervisory equipment's shooting focus to can clap the focus in the monitoring place most regional simultaneously, just can not change these shooting parameters again basically after this. Since the shooting parameters are fixed, the distance between the reference line and the alarm detection line in the image is constant and is set as a distance threshold. When the distance between the position of the target person and the preset reference line is larger than the distance threshold, it can be determined that the target person leaves the arming area, and the arming function can be started at this time. In this way, when a person steps into the defense area again, the security inspection equipment can detect and perform alarm processing.
Optionally, the preset distance threshold may be a distance between the reference line and a corresponding line segment of the preset alarm detection line in the image, or a sum of the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image and a preset distance value.
The reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference.
If the distance threshold is set to be the sum of the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image and the preset distance value, a margin can be reserved, and the defense deploying function is started after the target person completely leaves the defense deploying area to prevent false alarm.
In the process of identifying the target person, the target person in the image can be identified through a preset image identification algorithm. The target person in the images can also be identified by detecting moving objects in the two images. As for the second manner, the position of the target person in the moving state in the temporally subsequent image among the at least two images may be determined based on the at least two images acquired by the monitoring apparatus and a preset optical flow algorithm.
The optical flow algorithm may include an algorithm corresponding to a calcptical flowpyrlk, calcptical flowfarneback, calcptical flowbm, calcptical flowhs, calcptical flowsf, and other functions provided in OpenCV (Open Source Computer Vision Library).
The moving object in the image may be determined by an optical flow algorithm, and if the moving object is a human figure, the position of the center of the hindbrain, the position of the center of the body, or the position of the lower boundary of the human figure in the image, that is, the position of the foot, may be selected as the position of the human figure in the image, which is not limited in the embodiment of the present disclosure. Finally, the distance between the position of the person and the preset reference line may be determined based on the position of the person in the image. Therefore, the distance between the position of the person and the preset reference line can be determined in the image with the later shooting time, and the person can be further determined to be in or not to leave the defense area.
Alternatively, step S120 may include: acquiring an image shot by monitoring equipment, and identifying the number of people in the image; step S130 may include: and when the number of the people in the image is larger than a preset number threshold, starting the defense deploying function.
In the embodiment of the present disclosure, two ways are provided to determine the number of people in the image, and certainly, there may be other ways to determine the number of people in the image, which are not described herein again. And when the number of the people in the image is larger than a preset number threshold, starting the defense deploying function.
First, the images of the persons included in the images may be recognized, for example, by a machine learning model trained in advance. And the number of recognized persons can be determined.
Secondly, the target people in the motion state in the image can be determined based on an optical flow algorithm, the number of the target people in the motion state can be further determined, if the number is larger than a preset number threshold value, the defense deploying function is started, and meanwhile, the alarm processing can be carried out.
In implementation, when the number of the target persons in the motion state is determined to be larger than a preset number threshold value, such as 1, alarm processing is performed. If the monitoring place stipulates that only one person is left to trigger the defense-opening function finally, the number threshold value is set to be 1. The number threshold may be set according to specific situations, and may be set by a user. The user can input the quantity threshold value in the terminal, the terminal can generate a defense opening instruction when detecting that the user performs quantity threshold value input operation, and the defense opening instruction can carry the quantity threshold value.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the step of starting the arming function may include: and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
The reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference.
In implementation, if the distance between the position of the target person detected in the image acquired in any shooting cycle and the reference line is smaller than the distance between the position of the target person detected in the image acquired in the first preset number of shooting cycles before any shooting cycle and the reference line, the target person can be determined to go out of the monitoring place in the direction of entrance guard, but returns to the inside of the monitoring place in the opposite direction of the entrance guard on the way, which is illegal, so that the defense function can be immediately started, and meanwhile, the alarm processing can be carried out. The first preset number may be set by a user, the user may input the first preset number in the terminal, and the terminal may acquire and store the input first preset number. The terminal may also obtain a default first preset number, such as 20.
The alarm processing can be prompting security personnel in a security center which governs the monitoring places, turning on the monitoring videos of the monitoring places corresponding to the alarm processing, and remotely checking. If the target person returns to the inside of the monitoring place, the situation that the user forgets to take the object is solved, and the next step of processing can be omitted. If the target person returns to the inside of the monitoring place to take things belonging to the monitoring place or to perform other illegal operations, corresponding processing is needed.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the step of starting the arming function may include: and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
The reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference.
In implementation, if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, the target person can be determined to stay at a certain position in the monitoring place for a period of time, which is illegal, the defense function can be immediately started, and meanwhile, the alarm processing can be carried out. The process of alarm handling is similar to the above-described situation and is not described herein again. The second preset number may be set by a user, the user may input the second preset number in the terminal, and the terminal may obtain and store the input second preset number. The terminal may also obtain a default second preset number, such as 100.
By the method provided by the embodiment of the disclosure, the image shot by the monitoring equipment is analyzed to determine whether to start the defense deploying function, so that the defense deploying function can be prevented from being started by setting a fixed delay time to count down. The method provided by the embodiment can not start the defense deploying function when the related personnel have not left the monitoring place, and can not start the defense deploying function when the related personnel have left the monitoring place for a period of time, so that the time for starting the defense deploying function is more in line with the actual requirement.
Yet another exemplary embodiment of the present disclosure provides an apparatus for starting a defense function, as shown in fig. 3, the apparatus including:
a receiving module 310, configured to receive an instruction to start a defense deploying function;
the analysis module 320 is configured to obtain an image captured by the monitoring device, and analyze the image to obtain an analysis result;
and the arming module 330 is configured to, when the analysis result meets a preset condition for starting an arming function, start the arming function.
Optionally, the analysis module 320 is configured to:
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image;
the arming module 330 is configured to:
and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, the analysis module 320 is configured to:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the preset distance threshold value is determined based on the distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of a corresponding actual line in the image between the alarm detection line and the monitoring equipment.
Optionally, the analysis module 320 is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analyzing module 320 is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analysis module 320 is configured to obtain an image captured by a monitoring device, and identify the number of people in the image;
the arming module 330 is configured to, when the number of people in the image is greater than a preset number threshold, start an arming function.
Optionally, the preset distance threshold is a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, or a sum of a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image and a preset distance value.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
By the device provided by the embodiment of the disclosure, the image shot by the monitoring equipment is analyzed to determine whether to start the defense deploying function, so that the defense deploying function can be prevented from being started by setting a fixed delay time to count down. The device that this embodiment provided can not just open the function of deploying troops on garrison duty when relevant personnel have not walked out the control place yet, also can not open the function of deploying troops on garrison duty at relevant personnel have walked out the control place for a period of time yet for open the moment of deploying troops on garrison duty and accord with actual demand more.
It should be noted that: in the device for starting a defense function according to the embodiment, when the defense function is started, only the division of the functional modules is illustrated, and in practical application, the function distribution can be completed by different functional modules according to needs, that is, the internal structure of the terminal is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the device for starting the defense function and the method for starting the defense function provided by the embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment and is not described again.
Fig. 4 shows a schematic structural diagram of a terminal 1900 provided in an exemplary embodiment of the present disclosure. The terminal 1900, which may vary significantly depending on configuration or performance, may include one or more processors (CPUs) 1910 and one or more memories 1920. The memory 1920 stores at least one instruction, which is loaded and executed by the processor 1910 to implement the method for opening the arming function according to the above embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (5)

1. A method of enabling a arming function, the method comprising:
receiving an instruction for starting a defense deploying function;
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image, wherein the preset reference line is an edge line of a corresponding actual line in the image between a preset alarm detection line and the monitoring equipment;
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function, or if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
2. The method of claim 1, further comprising:
and if the detected distance is greater than a preset distance threshold value, starting the defense function, wherein the distance threshold value is determined based on the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image.
3. A device for enabling a arming function, the device comprising:
the receiving module is used for receiving an instruction for starting the defense deploying function;
the monitoring device comprises an analysis module, a detection module and a processing module, wherein the analysis module is used for detecting the distance between the position of a target person and a preset reference line in an image shot by the monitoring device, and the preset reference line is an edge line of a corresponding actual line in the image between a preset alarm detection line and the monitoring device;
and the defense deploying module is used for starting the defense deploying function if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, or starting the defense deploying function if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line.
4. The apparatus of claim 3, further comprising means for:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the distance threshold value is determined based on the distance between the reference line and the corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of the corresponding actual line in the image between the alarm detection line and the monitoring equipment.
5. A terminal, characterized in that the terminal comprises a processor, a communication interface, a memory and a communication bus, wherein:
the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory is used for storing a computer program;
the processor is configured to execute the program stored in the memory to implement the method steps of any of claims 1-2.
CN201811028668.1A 2018-09-04 2018-09-04 Method and device for starting defense deploying function Active CN110874906B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811028668.1A CN110874906B (en) 2018-09-04 2018-09-04 Method and device for starting defense deploying function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811028668.1A CN110874906B (en) 2018-09-04 2018-09-04 Method and device for starting defense deploying function

Publications (2)

Publication Number Publication Date
CN110874906A CN110874906A (en) 2020-03-10
CN110874906B true CN110874906B (en) 2022-08-16

Family

ID=69716996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811028668.1A Active CN110874906B (en) 2018-09-04 2018-09-04 Method and device for starting defense deploying function

Country Status (1)

Country Link
CN (1) CN110874906B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556293B (en) * 2020-04-26 2021-07-27 上海明略人工智能(集团)有限公司 Method and device for monitoring refrigeration house and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4987402A (en) * 1987-01-21 1991-01-22 Electronic Security Products Of California Alarm system for sensing and vocally warning of an unauthorized approach towards a protected object or zone
FR2837963A1 (en) * 2002-03-27 2003-10-03 Sin Etke Technology Co Ltd Motor vehicle access assistance demand anti theft alarm having detector car motor installed and alarm connected wireless unit and alerting owner remotely when abnormal condition detected.
CN2847402Y (en) * 2005-07-18 2006-12-13 侯康 Anti-pet balcony intelligent anti-theft warning lamp
CN103268680A (en) * 2013-05-29 2013-08-28 北京航空航天大学 Intelligent monitoring and anti-theft system for family
CN107545224A (en) * 2016-06-29 2018-01-05 珠海优特电力科技股份有限公司 The method and device of transformer station personnel Activity recognition
CN108320476A (en) * 2018-01-02 2018-07-24 北京空间飞行器总体设计部 A kind of intrusion alarm system intelligence cloth is withdrawn a garrison system and method
WO2018232922A1 (en) * 2017-06-23 2018-12-27 深圳市盛路物联通讯技术有限公司 Home security method and system

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6744462B2 (en) * 2000-12-12 2004-06-01 Koninklijke Philips Electronics N.V. Apparatus and methods for resolution of entry/exit conflicts for security monitoring systems
US7482923B2 (en) * 2005-01-27 2009-01-27 The Chamberlain Group, Inc. Alarm system interaction with a movable barrier operator method and apparatus
CN100596192C (en) * 2007-09-17 2010-03-24 深圳先进技术研究院 An intelligent digital system based on video and its processing method
CN101303785B (en) * 2008-06-26 2010-11-10 北京中星微电子有限公司 System and method for monitoring safety of ATM
US8217780B2 (en) * 2009-12-31 2012-07-10 Tyco Safety Products Canada Ltd. System and method for extension of entry delay in a security system
CN102542292B (en) * 2011-12-26 2014-03-26 湖北莲花山计算机视觉和信息科学研究院 Method for determining roles of staffs on basis of behaviors
US9247211B2 (en) * 2012-01-17 2016-01-26 Avigilon Fortress Corporation System and method for video content analysis using depth sensing
CN103226701B (en) * 2013-04-24 2016-04-20 天津大学 A kind of video semantic event modeling method
CN104156737B (en) * 2014-08-19 2017-07-11 哈尔滨工程大学 A kind of passenger on public transport Safe getting-off automatic testing method
US20160321892A1 (en) * 2015-04-29 2016-11-03 Honeywell International Inc. Monitoring system and method for combining detector and camera outputs
CN105069998A (en) * 2015-08-14 2015-11-18 江苏轩博电子科技有限公司 Terminal and method for realizing household security network alarming and video monitoring
US9865154B2 (en) * 2015-12-31 2018-01-09 Google Llc Adaptive exit arm times based on real time events and historical data in a home security system
CN105632058B (en) * 2016-03-17 2018-11-27 云丁网络技术(北京)有限公司 Intelligent alarm method and its alarm system based on human body infrared characteristic identification human body
US10452963B2 (en) * 2016-05-12 2019-10-22 Google Llc Arming and/or altering a home alarm system by specified positioning of everyday objects within view of a security camera
US9997054B2 (en) * 2016-06-07 2018-06-12 Ecolink Intelligent Technology, Inc. Method and apparatus for disarming a security system
US20180176512A1 (en) * 2016-10-26 2018-06-21 Ring Inc. Customizable intrusion zones associated with security systems
AU2017363273A1 (en) * 2016-11-23 2019-06-06 Alarm.Com Incorporated Detection of authorized user presence and handling of unauthenticated monitoring system commands

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4987402A (en) * 1987-01-21 1991-01-22 Electronic Security Products Of California Alarm system for sensing and vocally warning of an unauthorized approach towards a protected object or zone
FR2837963A1 (en) * 2002-03-27 2003-10-03 Sin Etke Technology Co Ltd Motor vehicle access assistance demand anti theft alarm having detector car motor installed and alarm connected wireless unit and alerting owner remotely when abnormal condition detected.
CN2847402Y (en) * 2005-07-18 2006-12-13 侯康 Anti-pet balcony intelligent anti-theft warning lamp
CN103268680A (en) * 2013-05-29 2013-08-28 北京航空航天大学 Intelligent monitoring and anti-theft system for family
CN107545224A (en) * 2016-06-29 2018-01-05 珠海优特电力科技股份有限公司 The method and device of transformer station personnel Activity recognition
WO2018232922A1 (en) * 2017-06-23 2018-12-27 深圳市盛路物联通讯技术有限公司 Home security method and system
CN108320476A (en) * 2018-01-02 2018-07-24 北京空间飞行器总体设计部 A kind of intrusion alarm system intelligence cloth is withdrawn a garrison system and method

Also Published As

Publication number Publication date
CN110874906A (en) 2020-03-10

Similar Documents

Publication Publication Date Title
KR101789690B1 (en) System and method for providing security service based on deep learning
CN108269333A (en) Face identification method, application server and computer readable storage medium
KR102195706B1 (en) Method and Apparatus for Detecting Intruder
US11263446B2 (en) Method for person re-identification in closed place, system, and terminal device
US20190304272A1 (en) Video detection and alarm method and apparatus
KR101858396B1 (en) Intelligent intrusion detection system
KR101530255B1 (en) Cctv system having auto tracking function of moving target
CN108875507B (en) Pedestrian tracking method, apparatus, system, and computer-readable storage medium
US10719717B2 (en) Scan face of video feed
US20220172504A1 (en) Devices, methods, and systems for occupancy detection
CN110675582A (en) Automatic alarm method and device
CN106331518A (en) Image processing method and device and electronic system
JP2018029237A5 (en)
US11348370B2 (en) Iris authentication device, iris authentication method, and recording medium
CN107122743A (en) Security-protecting and monitoring method, device and electronic equipment
CN108174026A (en) The safety prompt function method, apparatus and electronic equipment of a kind of mobile terminal
KR102022971B1 (en) Method for object of image and apparatus for the same
CN110874906B (en) Method and device for starting defense deploying function
KR102142315B1 (en) ATM security system based on image analyses and the method thereof
US11256910B2 (en) Method and system for locating an occupant
KR20200090403A (en) Electronic apparatus and the control method thereof
CN109583296A (en) One kind preventing error detection method, apparatus, system and computer storage medium
CN115346060A (en) Picture abnormity identification method and device, electronic equipment and storage medium
CN113744443B (en) Gate channel anti-cheating control method, device, equipment and storage medium
US20120160525A1 (en) Video-based fire detection and suppression with closed-loop control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant