CN110874906B - Method and device for starting defense deploying function - Google Patents
Method and device for starting defense deploying function Download PDFInfo
- Publication number
- CN110874906B CN110874906B CN201811028668.1A CN201811028668A CN110874906B CN 110874906 B CN110874906 B CN 110874906B CN 201811028668 A CN201811028668 A CN 201811028668A CN 110874906 B CN110874906 B CN 110874906B
- Authority
- CN
- China
- Prior art keywords
- distance
- function
- image
- starting
- line
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
Abstract
The disclosure relates to a method and a device for starting a defense deploying function, and belongs to the technical field of security and protection. The method comprises the following steps: receiving an instruction for starting a defense deploying function; acquiring an image shot by monitoring equipment, and analyzing the image to obtain an analysis result; and when the analysis result meets the preset condition of starting the defense deploying function, starting the defense deploying function. By adopting the method and the device, the defense deploying function can not be started when the relevant personnel have not left the monitoring place, and the defense deploying function can not be started when the relevant personnel have left the monitoring place for a period of time, so that the time for starting the defense deploying function is more in line with the actual requirement.
Description
Technical Field
The disclosure relates to the technical field of security protection, in particular to a method and a device for starting a defense deploying function.
Background
Along with the development of society, the demand of people for public security is higher and higher. In some monitoring places (such as banks, jewelry stores and the like), no person on duty is left in the monitoring places for watching after the time on duty. For example, after 5 pm, all personnel in the bank are off duty, including on-site security personnel. At this time, delayed defense deployment is required for the monitored site.
The delayed arming is to start the arming function after a preset time. For example, a bank-related person operates and starts the delayed defense function in a computer device, the computer device counts down, and after 30 seconds, the defense function is automatically started. After the defense deploying function is started, security check equipment such as infrared equipment near the entrance guard emits infrared rays, and the projection of the infrared ray beams on the ground can be called an alarm detection line. When a person crosses the alarm detection line, the infrared ray can be shielded, so that the infrared equipment can detect the entrance of the person, and further can perform alarm processing. In the process, the reason for delay defense deployment is that a certain delay is left for relevant personnel to go out of a monitoring place after operating computer equipment, so that false alarm caused by the fact that the security inspection equipment detects the relevant personnel is avoided.
In carrying out the present disclosure, the inventors found that at least the following problems exist:
the time delay duration in the time delay defense deployment is difficult to set. If the setting is short, related personnel do not leave the monitoring place, the defense deploying function is started, and further false alarm is generated because the security inspection equipment detects the related personnel. If the setting is long, the related personnel have already walked out of the monitoring place for a period of time, and the defense function has not been started, and the time gap can be utilized by lawbreakers. There is no effective mechanism to solve the above problems.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides the following technical solutions:
according to a first aspect of an embodiment of the present disclosure, there is provided a method for starting a defense function, the method including:
receiving an instruction for starting a defense deploying function;
acquiring an image shot by monitoring equipment, and analyzing the image to obtain an analysis result;
and when the analysis result meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, the acquiring an image captured by a monitoring device, and analyzing the image to obtain an analysis result includes:
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image;
when the analysis result meets the preset condition of starting the defense deploying function, the defense deploying function is started, and the method comprises the following steps:
and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the starting the arming function includes:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the preset distance threshold value is determined based on the distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of a corresponding actual line in the image between the alarm detection line and the monitoring equipment.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the starting the arming function includes:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the starting the arming function includes:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, acquiring an image captured by the monitoring device, and analyzing the image to obtain an analysis result, including:
acquiring an image shot by monitoring equipment, and identifying the number of people in the image;
when the analysis result meets the preset condition of starting the defense deploying function, the defense deploying function is started, and the method comprises the following steps:
and when the number of the people in the image is larger than a preset number threshold, starting a defense deploying function.
Optionally, the preset distance threshold is a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, or a sum of a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image and a preset distance value.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for turning on a arming function, the apparatus comprising:
the receiving module is used for receiving an instruction for starting the defense deploying function;
the analysis module is used for acquiring images shot by the monitoring equipment and analyzing the images to obtain analysis results;
and the defense deploying module is used for starting the defense deploying function when the analysis result meets the preset condition of starting the defense deploying function.
Optionally, the analysis module is configured to:
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image;
when the analysis result meets the preset condition of starting the defense deploying function, the defense deploying function is started, and the method comprises the following steps:
and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, the analysis module is configured to:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the preset distance threshold value is determined based on the distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of a corresponding actual line in the image between the alarm detection line and the monitoring equipment.
Optionally, the analysis module is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analysis module is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analysis module is configured to obtain an image captured by a monitoring device, and identify the number of people in the image;
the defense deploying module is used for starting a defense deploying function when the number of the people in the image is larger than a preset number threshold.
Optionally, the preset distance threshold is a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, or a sum of a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image and a preset distance value.
According to a third aspect of the embodiments of the present disclosure, there is provided a terminal comprising a processor, a communication interface, a memory, and a communication bus, wherein:
the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory is used for storing a computer program;
the processor is used for executing the program stored in the memory so as to realize the method for starting the defense function.
According to a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the method for opening a defense function described above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
by the method provided by the embodiment of the disclosure, the image shot by the monitoring equipment is analyzed to determine whether to start the defense deploying function, so that the defense deploying function can be prevented from being started by setting a fixed delay time to count down. The method provided by the embodiment can not start the defense deploying function when the related personnel have not left the monitoring place, and can not start the defense deploying function when the related personnel have left the monitoring place for a period of time, so that the time for starting the defense deploying function is more in line with the actual requirement.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a method of enabling a arming function according to an exemplary embodiment;
FIG. 2 is a schematic illustration of a monitoring location shown in accordance with an exemplary embodiment;
FIG. 3 is a schematic diagram illustrating a configuration of a device for initiating a arming function according to one exemplary embodiment;
fig. 4 is a schematic diagram illustrating a structure of a terminal according to an exemplary embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the disclosure provides a method for starting a defense deploying function, which can be realized by a terminal. The terminal can be a tablet computer, a desktop computer, a defense terminal and the like.
The terminal may include a processor, memory, etc. The processor, which may be a CPU (Central Processing Unit), may be used for analyzing the image, obtaining an analysis result, and the like. The Memory may be a RAM (Random Access Memory), a Flash (Flash Memory), and the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, and the like, such as a preset distance threshold.
The terminal may also include a transceiver, input components, display components, audio output components, and the like. The transceiver can be used for data transmission with the server and sending alarm information to the server, and the transceiver can comprise a Bluetooth component, a WiFi (Wireless-Fidelity) component, an antenna, a matching circuit, a modem and the like. The input means may be a touch screen, keyboard, mouse, etc. The audio output component may be a speaker, headphones, or the like.
An exemplary embodiment of the present disclosure provides a method for starting a defense function, as shown in fig. 1, a processing flow of the method may include the following steps:
step S110, receiving an instruction to start the arming function.
In implementation, after the duty time of the monitoring place is over, a related person can be left to trigger the starting of the defense function of the monitoring place. As shown in fig. 2, a terminal for triggering the opening of the arming function of the monitoring place may be disposed at a position a, a door is at a position B, and after the terminal triggers the opening of the arming function of the monitoring place, a relevant person needs to travel a distance to reach the position B where the door is located, and then exit from the door to the outside of the monitoring place. In the process that the relevant person reaches the position B where the door is located through a certain distance, the person needs to pass through a box-selected area, and the area is the defense area. If the defense function is immediately effective after the related personnel trigger the start of the defense function of the monitoring place, the related personnel can be detected by the security inspection equipment when passing through the defense area, and false alarm is generated. Therefore, it is necessary to wait for the relevant person to leave the defense area and then to enable the defense function.
When related personnel carry out triggering operation for starting the defense deploying function in the terminal, the terminal can receive an instruction for starting the defense deploying function.
And step S120, acquiring the image shot by the monitoring equipment, and analyzing the image to obtain an analysis result.
In implementation, the images captured by the monitoring device may be analyzed, such as a recognition process, a process of determining the position of a target person, and the like. After the images taken by the monitoring device are analyzed, corresponding analysis results can be obtained.
And step S130, when the analysis result meets the preset condition of starting the defense function, starting the defense function.
In implementation, when the analysis result meets a preset condition for starting the defense function, the defense function can be triggered to be started.
Alternatively, step S120 may include: the method includes the steps of obtaining an image shot through a monitoring device, and detecting the distance between the position of a target person and a preset reference line in the image. Step S130 may include: and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
In implementation, whether to turn on the arming function may be determined based on the distance between the position of the target person and a preset reference line of the image.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the step of starting the arming function may include: and if the detected distance is greater than a preset distance threshold value, starting the defense deploying function. The preset distance threshold is determined based on the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image, and the reference line is the edge line of the corresponding actual line in the image between the alarm detection line and the monitoring equipment.
After the defense deploying function is started, security check equipment such as infrared equipment near the entrance guard emits infrared rays, and the projection of the infrared ray beams on the ground can be called an alarm detection line. When a person crosses the alarm detection line, the infrared ray can be shielded, so that the infrared equipment can detect the entrance of the person, and further can perform alarm processing. Or, the monitoring device shoots an image in a monitoring place, and when the image includes a person image, alarm processing is performed, and corresponding actual lines closest to the entrance guard among four edges in an effective shooting area of the monitoring device may be called alarm detection lines.
Further, the reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference. The reference line may also be a line set by a user, and the user may input the position of the reference line in the image in the terminal, for example, the position of the reference line in the image by a slide selection operation, or the coordinates of the horizontal axis, the vertical axis, and the like of the reference line in the image. The terminal can acquire the position of the input reference line in the image, but requires that the actual line corresponding to the input reference line is positioned between the alarm detection line and the monitoring equipment.
In practice, as shown in fig. 2, a monitoring device may be located at location C, and the monitoring device may capture images of a scene over a large area within the monitored facility, such as an area of a defense. The monitoring device can shoot images in the monitoring place according to a preset period and send the shot images to the terminal. Further, the terminal can acquire images in the monitoring place. Then, the terminal may identify a target person in the acquired image, determine the position of the target person, and further may determine a distance between the position of the target person and a preset reference line.
The general certain position of fixed mounting of supervisory equipment on the wall that can then have installer adjustment supervisory equipment's shooting angle, can generally adjust supervisory equipment's shooting angle for can clapping the angle in the monitoring place most regional, still can adjust supervisory equipment's shooting focus to can clap the focus in the monitoring place most regional simultaneously, just can not change these shooting parameters again basically after this. Since the shooting parameters are fixed, the distance between the reference line and the alarm detection line in the image is constant and is set as a distance threshold. When the distance between the position of the target person and the preset reference line is larger than the distance threshold, it can be determined that the target person leaves the arming area, and the arming function can be started at this time. In this way, when a person steps into the defense area again, the security inspection equipment can detect and perform alarm processing.
Optionally, the preset distance threshold may be a distance between the reference line and a corresponding line segment of the preset alarm detection line in the image, or a sum of the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image and a preset distance value.
The reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference.
If the distance threshold is set to be the sum of the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image and the preset distance value, a margin can be reserved, and the defense deploying function is started after the target person completely leaves the defense deploying area to prevent false alarm.
In the process of identifying the target person, the target person in the image can be identified through a preset image identification algorithm. The target person in the images can also be identified by detecting moving objects in the two images. As for the second manner, the position of the target person in the moving state in the temporally subsequent image among the at least two images may be determined based on the at least two images acquired by the monitoring apparatus and a preset optical flow algorithm.
The optical flow algorithm may include an algorithm corresponding to a calcptical flowpyrlk, calcptical flowfarneback, calcptical flowbm, calcptical flowhs, calcptical flowsf, and other functions provided in OpenCV (Open Source Computer Vision Library).
The moving object in the image may be determined by an optical flow algorithm, and if the moving object is a human figure, the position of the center of the hindbrain, the position of the center of the body, or the position of the lower boundary of the human figure in the image, that is, the position of the foot, may be selected as the position of the human figure in the image, which is not limited in the embodiment of the present disclosure. Finally, the distance between the position of the person and the preset reference line may be determined based on the position of the person in the image. Therefore, the distance between the position of the person and the preset reference line can be determined in the image with the later shooting time, and the person can be further determined to be in or not to leave the defense area.
Alternatively, step S120 may include: acquiring an image shot by monitoring equipment, and identifying the number of people in the image; step S130 may include: and when the number of the people in the image is larger than a preset number threshold, starting the defense deploying function.
In the embodiment of the present disclosure, two ways are provided to determine the number of people in the image, and certainly, there may be other ways to determine the number of people in the image, which are not described herein again. And when the number of the people in the image is larger than a preset number threshold, starting the defense deploying function.
First, the images of the persons included in the images may be recognized, for example, by a machine learning model trained in advance. And the number of recognized persons can be determined.
Secondly, the target people in the motion state in the image can be determined based on an optical flow algorithm, the number of the target people in the motion state can be further determined, if the number is larger than a preset number threshold value, the defense deploying function is started, and meanwhile, the alarm processing can be carried out.
In implementation, when the number of the target persons in the motion state is determined to be larger than a preset number threshold value, such as 1, alarm processing is performed. If the monitoring place stipulates that only one person is left to trigger the defense-opening function finally, the number threshold value is set to be 1. The number threshold may be set according to specific situations, and may be set by a user. The user can input the quantity threshold value in the terminal, the terminal can generate a defense opening instruction when detecting that the user performs quantity threshold value input operation, and the defense opening instruction can carry the quantity threshold value.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the step of starting the arming function may include: and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
The reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference.
In implementation, if the distance between the position of the target person detected in the image acquired in any shooting cycle and the reference line is smaller than the distance between the position of the target person detected in the image acquired in the first preset number of shooting cycles before any shooting cycle and the reference line, the target person can be determined to go out of the monitoring place in the direction of entrance guard, but returns to the inside of the monitoring place in the opposite direction of the entrance guard on the way, which is illegal, so that the defense function can be immediately started, and meanwhile, the alarm processing can be carried out. The first preset number may be set by a user, the user may input the first preset number in the terminal, and the terminal may acquire and store the input first preset number. The terminal may also obtain a default first preset number, such as 20.
The alarm processing can be prompting security personnel in a security center which governs the monitoring places, turning on the monitoring videos of the monitoring places corresponding to the alarm processing, and remotely checking. If the target person returns to the inside of the monitoring place, the situation that the user forgets to take the object is solved, and the next step of processing can be omitted. If the target person returns to the inside of the monitoring place to take things belonging to the monitoring place or to perform other illegal operations, corresponding processing is needed.
Optionally, when the detected distance satisfies a preset condition for starting the arming function, the step of starting the arming function may include: and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
The reference line may be an edge line in the image where the corresponding actual line is located between the alarm detection line and the monitoring device. If four edge lines of the image are mapped into reality, there are four real lines. An actual line corresponding to the edge line is arranged between the alarm detection line and the monitoring equipment, and the edge line can be selected as a reference.
In implementation, if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, the target person can be determined to stay at a certain position in the monitoring place for a period of time, which is illegal, the defense function can be immediately started, and meanwhile, the alarm processing can be carried out. The process of alarm handling is similar to the above-described situation and is not described herein again. The second preset number may be set by a user, the user may input the second preset number in the terminal, and the terminal may obtain and store the input second preset number. The terminal may also obtain a default second preset number, such as 100.
By the method provided by the embodiment of the disclosure, the image shot by the monitoring equipment is analyzed to determine whether to start the defense deploying function, so that the defense deploying function can be prevented from being started by setting a fixed delay time to count down. The method provided by the embodiment can not start the defense deploying function when the related personnel have not left the monitoring place, and can not start the defense deploying function when the related personnel have left the monitoring place for a period of time, so that the time for starting the defense deploying function is more in line with the actual requirement.
Yet another exemplary embodiment of the present disclosure provides an apparatus for starting a defense function, as shown in fig. 3, the apparatus including:
a receiving module 310, configured to receive an instruction to start a defense deploying function;
the analysis module 320 is configured to obtain an image captured by the monitoring device, and analyze the image to obtain an analysis result;
and the arming module 330 is configured to, when the analysis result meets a preset condition for starting an arming function, start the arming function.
Optionally, the analysis module 320 is configured to:
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image;
the arming module 330 is configured to:
and when the detected distance meets the preset condition of starting the defense deploying function, starting the defense deploying function.
Optionally, the analysis module 320 is configured to:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the preset distance threshold value is determined based on the distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of a corresponding actual line in the image between the alarm detection line and the monitoring equipment.
Optionally, the analysis module 320 is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analyzing module 320 is configured to:
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
Optionally, the analysis module 320 is configured to obtain an image captured by a monitoring device, and identify the number of people in the image;
the arming module 330 is configured to, when the number of people in the image is greater than a preset number threshold, start an arming function.
Optionally, the preset distance threshold is a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image, or a sum of a distance between the reference line and a corresponding line segment of a preset alarm detection line in the image and a preset distance value.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
By the device provided by the embodiment of the disclosure, the image shot by the monitoring equipment is analyzed to determine whether to start the defense deploying function, so that the defense deploying function can be prevented from being started by setting a fixed delay time to count down. The device that this embodiment provided can not just open the function of deploying troops on garrison duty when relevant personnel have not walked out the control place yet, also can not open the function of deploying troops on garrison duty at relevant personnel have walked out the control place for a period of time yet for open the moment of deploying troops on garrison duty and accord with actual demand more.
It should be noted that: in the device for starting a defense function according to the embodiment, when the defense function is started, only the division of the functional modules is illustrated, and in practical application, the function distribution can be completed by different functional modules according to needs, that is, the internal structure of the terminal is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the device for starting the defense function and the method for starting the defense function provided by the embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment and is not described again.
Fig. 4 shows a schematic structural diagram of a terminal 1900 provided in an exemplary embodiment of the present disclosure. The terminal 1900, which may vary significantly depending on configuration or performance, may include one or more processors (CPUs) 1910 and one or more memories 1920. The memory 1920 stores at least one instruction, which is loaded and executed by the processor 1910 to implement the method for opening the arming function according to the above embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (5)
1. A method of enabling a arming function, the method comprising:
receiving an instruction for starting a defense deploying function;
acquiring an image shot by monitoring equipment, and detecting the distance between the position of a target person and a preset reference line in the image, wherein the preset reference line is an edge line of a corresponding actual line in the image between a preset alarm detection line and the monitoring equipment;
and if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, starting the defense function, or if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line, starting the defense function.
2. The method of claim 1, further comprising:
and if the detected distance is greater than a preset distance threshold value, starting the defense function, wherein the distance threshold value is determined based on the distance between the reference line and the corresponding line segment of the preset alarm detection line in the image.
3. A device for enabling a arming function, the device comprising:
the receiving module is used for receiving an instruction for starting the defense deploying function;
the monitoring device comprises an analysis module, a detection module and a processing module, wherein the analysis module is used for detecting the distance between the position of a target person and a preset reference line in an image shot by the monitoring device, and the preset reference line is an edge line of a corresponding actual line in the image between a preset alarm detection line and the monitoring device;
and the defense deploying module is used for starting the defense deploying function if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is smaller than the distance between the position of the target person detected in the image acquired in a first preset number of shooting periods before any shooting period and the reference line, or starting the defense deploying function if the distance between the position of the target person detected in the image acquired in any shooting period and the reference line is equal to the distance between the position of the target person detected in the image acquired in a second preset number of shooting periods before any shooting period and the reference line.
4. The apparatus of claim 3, further comprising means for:
and if the detected distance is greater than a preset distance threshold value, starting a defense function, wherein the distance threshold value is determined based on the distance between the reference line and the corresponding line segment of a preset alarm detection line in the image, and the reference line is an edge line of the corresponding actual line in the image between the alarm detection line and the monitoring equipment.
5. A terminal, characterized in that the terminal comprises a processor, a communication interface, a memory and a communication bus, wherein:
the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory is used for storing a computer program;
the processor is configured to execute the program stored in the memory to implement the method steps of any of claims 1-2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811028668.1A CN110874906B (en) | 2018-09-04 | 2018-09-04 | Method and device for starting defense deploying function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811028668.1A CN110874906B (en) | 2018-09-04 | 2018-09-04 | Method and device for starting defense deploying function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110874906A CN110874906A (en) | 2020-03-10 |
CN110874906B true CN110874906B (en) | 2022-08-16 |
Family
ID=69716996
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811028668.1A Active CN110874906B (en) | 2018-09-04 | 2018-09-04 | Method and device for starting defense deploying function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110874906B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111556293B (en) * | 2020-04-26 | 2021-07-27 | 上海明略人工智能(集团)有限公司 | Method and device for monitoring refrigeration house and readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4987402A (en) * | 1987-01-21 | 1991-01-22 | Electronic Security Products Of California | Alarm system for sensing and vocally warning of an unauthorized approach towards a protected object or zone |
FR2837963A1 (en) * | 2002-03-27 | 2003-10-03 | Sin Etke Technology Co Ltd | Motor vehicle access assistance demand anti theft alarm having detector car motor installed and alarm connected wireless unit and alerting owner remotely when abnormal condition detected. |
CN2847402Y (en) * | 2005-07-18 | 2006-12-13 | 侯康 | Anti-pet balcony intelligent anti-theft warning lamp |
CN103268680A (en) * | 2013-05-29 | 2013-08-28 | 北京航空航天大学 | Intelligent monitoring and anti-theft system for family |
CN107545224A (en) * | 2016-06-29 | 2018-01-05 | 珠海优特电力科技股份有限公司 | The method and device of transformer station personnel Activity recognition |
CN108320476A (en) * | 2018-01-02 | 2018-07-24 | 北京空间飞行器总体设计部 | A kind of intrusion alarm system intelligence cloth is withdrawn a garrison system and method |
WO2018232922A1 (en) * | 2017-06-23 | 2018-12-27 | 深圳市盛路物联通讯技术有限公司 | Home security method and system |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6744462B2 (en) * | 2000-12-12 | 2004-06-01 | Koninklijke Philips Electronics N.V. | Apparatus and methods for resolution of entry/exit conflicts for security monitoring systems |
US7482923B2 (en) * | 2005-01-27 | 2009-01-27 | The Chamberlain Group, Inc. | Alarm system interaction with a movable barrier operator method and apparatus |
CN100596192C (en) * | 2007-09-17 | 2010-03-24 | 深圳先进技术研究院 | An intelligent digital system based on video and its processing method |
CN101303785B (en) * | 2008-06-26 | 2010-11-10 | 北京中星微电子有限公司 | System and method for monitoring safety of ATM |
US8217780B2 (en) * | 2009-12-31 | 2012-07-10 | Tyco Safety Products Canada Ltd. | System and method for extension of entry delay in a security system |
CN102542292B (en) * | 2011-12-26 | 2014-03-26 | 湖北莲花山计算机视觉和信息科学研究院 | Method for determining roles of staffs on basis of behaviors |
US9247211B2 (en) * | 2012-01-17 | 2016-01-26 | Avigilon Fortress Corporation | System and method for video content analysis using depth sensing |
CN103226701B (en) * | 2013-04-24 | 2016-04-20 | 天津大学 | A kind of video semantic event modeling method |
CN104156737B (en) * | 2014-08-19 | 2017-07-11 | 哈尔滨工程大学 | A kind of passenger on public transport Safe getting-off automatic testing method |
US20160321892A1 (en) * | 2015-04-29 | 2016-11-03 | Honeywell International Inc. | Monitoring system and method for combining detector and camera outputs |
CN105069998A (en) * | 2015-08-14 | 2015-11-18 | 江苏轩博电子科技有限公司 | Terminal and method for realizing household security network alarming and video monitoring |
US9865154B2 (en) * | 2015-12-31 | 2018-01-09 | Google Llc | Adaptive exit arm times based on real time events and historical data in a home security system |
CN105632058B (en) * | 2016-03-17 | 2018-11-27 | 云丁网络技术(北京)有限公司 | Intelligent alarm method and its alarm system based on human body infrared characteristic identification human body |
US10452963B2 (en) * | 2016-05-12 | 2019-10-22 | Google Llc | Arming and/or altering a home alarm system by specified positioning of everyday objects within view of a security camera |
US9997054B2 (en) * | 2016-06-07 | 2018-06-12 | Ecolink Intelligent Technology, Inc. | Method and apparatus for disarming a security system |
US20180176512A1 (en) * | 2016-10-26 | 2018-06-21 | Ring Inc. | Customizable intrusion zones associated with security systems |
AU2017363273A1 (en) * | 2016-11-23 | 2019-06-06 | Alarm.Com Incorporated | Detection of authorized user presence and handling of unauthenticated monitoring system commands |
-
2018
- 2018-09-04 CN CN201811028668.1A patent/CN110874906B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4987402A (en) * | 1987-01-21 | 1991-01-22 | Electronic Security Products Of California | Alarm system for sensing and vocally warning of an unauthorized approach towards a protected object or zone |
FR2837963A1 (en) * | 2002-03-27 | 2003-10-03 | Sin Etke Technology Co Ltd | Motor vehicle access assistance demand anti theft alarm having detector car motor installed and alarm connected wireless unit and alerting owner remotely when abnormal condition detected. |
CN2847402Y (en) * | 2005-07-18 | 2006-12-13 | 侯康 | Anti-pet balcony intelligent anti-theft warning lamp |
CN103268680A (en) * | 2013-05-29 | 2013-08-28 | 北京航空航天大学 | Intelligent monitoring and anti-theft system for family |
CN107545224A (en) * | 2016-06-29 | 2018-01-05 | 珠海优特电力科技股份有限公司 | The method and device of transformer station personnel Activity recognition |
WO2018232922A1 (en) * | 2017-06-23 | 2018-12-27 | 深圳市盛路物联通讯技术有限公司 | Home security method and system |
CN108320476A (en) * | 2018-01-02 | 2018-07-24 | 北京空间飞行器总体设计部 | A kind of intrusion alarm system intelligence cloth is withdrawn a garrison system and method |
Also Published As
Publication number | Publication date |
---|---|
CN110874906A (en) | 2020-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101789690B1 (en) | System and method for providing security service based on deep learning | |
CN108269333A (en) | Face identification method, application server and computer readable storage medium | |
KR102195706B1 (en) | Method and Apparatus for Detecting Intruder | |
US11263446B2 (en) | Method for person re-identification in closed place, system, and terminal device | |
US20190304272A1 (en) | Video detection and alarm method and apparatus | |
KR101858396B1 (en) | Intelligent intrusion detection system | |
KR101530255B1 (en) | Cctv system having auto tracking function of moving target | |
CN108875507B (en) | Pedestrian tracking method, apparatus, system, and computer-readable storage medium | |
US10719717B2 (en) | Scan face of video feed | |
US20220172504A1 (en) | Devices, methods, and systems for occupancy detection | |
CN110675582A (en) | Automatic alarm method and device | |
CN106331518A (en) | Image processing method and device and electronic system | |
JP2018029237A5 (en) | ||
US11348370B2 (en) | Iris authentication device, iris authentication method, and recording medium | |
CN107122743A (en) | Security-protecting and monitoring method, device and electronic equipment | |
CN108174026A (en) | The safety prompt function method, apparatus and electronic equipment of a kind of mobile terminal | |
KR102022971B1 (en) | Method for object of image and apparatus for the same | |
CN110874906B (en) | Method and device for starting defense deploying function | |
KR102142315B1 (en) | ATM security system based on image analyses and the method thereof | |
US11256910B2 (en) | Method and system for locating an occupant | |
KR20200090403A (en) | Electronic apparatus and the control method thereof | |
CN109583296A (en) | One kind preventing error detection method, apparatus, system and computer storage medium | |
CN115346060A (en) | Picture abnormity identification method and device, electronic equipment and storage medium | |
CN113744443B (en) | Gate channel anti-cheating control method, device, equipment and storage medium | |
US20120160525A1 (en) | Video-based fire detection and suppression with closed-loop control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |