CN110942576A - Intrusion monitoring device, method and system - Google Patents

Intrusion monitoring device, method and system Download PDF

Info

Publication number
CN110942576A
CN110942576A CN201911296260.7A CN201911296260A CN110942576A CN 110942576 A CN110942576 A CN 110942576A CN 201911296260 A CN201911296260 A CN 201911296260A CN 110942576 A CN110942576 A CN 110942576A
Authority
CN
China
Prior art keywords
iot chip
time
value
iot
preset value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911296260.7A
Other languages
Chinese (zh)
Inventor
尤鸿
谢仁艿
赵伟光
张远文
黄亚楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unicom Internet of Things Corp Ltd
Original Assignee
China Unicom Internet of Things Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unicom Internet of Things Corp Ltd filed Critical China Unicom Internet of Things Corp Ltd
Priority to CN201911296260.7A priority Critical patent/CN110942576A/en
Publication of CN110942576A publication Critical patent/CN110942576A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/19Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides an intrusion monitoring device, method and system. This intrusion monitoring device includes: the system comprises a main control terminal and N node terminals, wherein N is more than or equal to 1; wherein, the main control terminal includes: the narrow-band Internet of things system comprises a narrow-band Internet of things NB-IoT chip and a first communication module, wherein the NB-IoT chip is connected with the first communication module, and the master control terminal is connected with the N node terminals through the first communication module. The device replaces the mode of adding the base station to the gateway equipment in the prior art with the mode of adding the NB-IoT chip and the NB-IoT base station, so that the occupied space is reduced; and the design of NB-IoT chip has reduced the consumption greatly compared with gateway equipment, has also avoided gateway equipment simultaneously because the software and hardware all has 2 trouble entrances of MCU and communication module and the problem of easily makeing mistakes.

Description

Intrusion monitoring device, method and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an intrusion monitoring apparatus, method, and system.
Background
In order to prevent intruders, external alarm devices are generally installed at corners of places such as shops, supermarkets, offices, warehouses and the like. When the infrared alarm device detects that someone invades, the buzzer alarms, and after a user hears alarm sound, the user can patrol whether the person really invades and check the goods integrity rate. However, when the user is absent, the intrusion situation cannot be grasped because the alarm sound from the buzzer cannot be heard. Therefore, it is particularly important to provide a device that allows a user who is out of the door to grasp the intrusion state at any time.
In the prior art, a gateway is provided in the above-mentioned location, the infrared alarm devices at each corner are connected to the gateway, when a certain infrared alarm device detects the intrusion of a person, the intrusion message is sent to the gateway, the gateway forwards the intrusion message to the server, and the server further sends the intrusion message to the user.
However, since the gateway is large in size, it needs to occupy a large space.
Disclosure of Invention
The invention provides an intrusion monitoring device, method and system, which are used for solving the problem of large occupied space caused by deployment of gateway equipment in a monitoring place in the prior art.
In a first aspect, the present invention provides an intrusion monitoring device, including:
the system comprises a main control terminal and N node terminals, wherein N is more than or equal to 1;
wherein, the main control terminal includes: the narrow-band Internet of things system comprises a narrow-band Internet of things (NB-IoT) chip and a first communication module, wherein the NB-IoT chip is connected with the first communication module, and the master control terminal is connected with the N node terminals through the first communication module;
and the NB-IoT chip is used for reporting corresponding alarm information to a server through an NB-IoT base station when the main control terminal or the node terminal detects the invasion of a person.
Optionally, the main control terminal further includes: a first intrusion detection sensor;
the first intrusion detection sensor is connected with the NB-IoT chip, the first intrusion detection sensor is used for detecting infrared ray interruption information and sending the infrared ray interruption information to the NB-IoT chip, the NB-IoT chip is used for judging whether a person intrudes according to the infrared ray interruption information, and if yes, first alarm information is generated.
Optionally, the main control terminal further includes: a first buzzer;
the first buzzer is connected with the NB-IoT chip and used for giving an alarm according to a control instruction sent by the NB-IoT chip.
Optionally, the node terminal includes: the system comprises a processor, a second communication module and a second intrusion detection sensor;
the second communication module and the second intrusion detection sensor are connected with the processor, the second intrusion detection sensor is used for detecting infrared interruption information and sending the infrared interruption information to the processor, the processor is used for judging whether a person intrudes according to the infrared interruption information, if yes, second alarm information is generated, and the second alarm information is sent to the NB-IoT chip through the second communication module.
Optionally, the node terminal further includes: a second buzzer;
the second buzzer is connected with the processor and used for giving an alarm according to the control instruction sent by the processor.
Optionally, the first communication module and the second communication module are both energy collection EnOcean modules.
Optionally, the processor is an open source central processing unit OpenCPU.
Optionally, the first intrusion detection sensor and the second intrusion detection sensor are infrared sensors.
Optionally, the first intrusion detection sensor is connected to the NB-IoT chip through an external interrupt pin of the NB-IoT chip, the first communication module is connected to the NB-IoT chip through a UART, and the first buzzer is connected to the NB-IoT chip through a digital bus;
the second intrusion detection sensor passes through the outside interrupt pin of treater with the treater is connected, the second communication module pass through universal asynchronous receiver transmitter UART with the treater is connected, the second bee calling organ pass through digital bus with the treater is connected.
In a second aspect, the present invention provides an intrusion monitoring system, which includes the above intrusion monitoring apparatus, an NB-IoT base station, a server, and a user terminal.
In a third aspect, the present invention provides an intrusion monitoring method, including:
after the NB-IoT chip receives the infrared interruption information reported by the first intrusion detection sensor for the first time, updating the value of the counter to a first preset value, and setting a time accumulation value as a second preset value, wherein the time accumulation value is accumulated along with time;
and after the NB-IoT chip receives the infrared interruption information reported for multiple times after the first intrusion detection sensor reports for the first time, generating the first alarm information according to the time reported for multiple times, the first preset value and the second preset value.
Optionally, the first preset value is 1, and the second preset value is 0.
Optionally, after the NB-IoT chip receives that the first intrusion detection sensor reports infrared interruption information for multiple times after reporting for the first time, the NB-IoT chip generates the first alarm information according to the multiple times of reporting time, the first preset value, and the second preset value, including:
for each report in the multiple reports according to the time sequence, if the time accumulation value is within a preset time range, the NB-IoT chip adds 1 to the value of the counter, and the time accumulation value is set to be a second preset value again;
when the value of the counter is equal to a third preset value, the NB-IoT chip sets the time accumulation value to be a second preset value again, and stores infrared interruption information reported each time after the value of the counter is greater than the third preset value;
and when the time accumulation value is greater than or equal to a fourth preset value, the NB-IoT chip generates the first alarm information according to the stored infrared ray interruption information.
Optionally, the method further includes:
the NB-IoT chip checks whether a disarming command is cached in the server;
if yes, the NB-IoT chip updates the state of the NB-IoT chip to disarming, and broadcasts a state updating message to each node terminal through the first communication module so that each node terminal updates the state to disarming;
if the status change error message fed back by any node terminal is received within a preset time period, the NB-IoT chip sends the status update message to the corresponding node terminal again until the node terminal does not feed back the status change error message within the preset time period.
Optionally, before the NB-IoT chip receives that the first intrusion detection sensor reports the infrared interruption information for the first time, the method further includes:
the NB-IoT chip checks whether a defense command is cached in the server;
if yes, updating the state of the NB-IoT chip to be defense deployment, and broadcasting a state updating message to each node terminal through the first communication module so that each node terminal updates the state to be defense deployment;
and if the status change error message fed back by any node terminal is received within a preset time period, the NB-IoT chip sends the status update message to the corresponding node terminal again until all the node terminals do not feed back the status change error message within the preset time period.
In a fourth aspect, the present invention provides an intrusion monitoring method, including:
after the processor receives the infrared interruption information reported by the second intrusion detection sensor for the first time, updating the value of the counter to a first preset value, and setting a time accumulation value as a second preset value, wherein the time accumulation value is accumulated along with time;
and after the processor receives the infrared interruption information reported for multiple times after the first report of the second intrusion detection sensor, generating second alarm information according to the time reported for multiple times, the first preset value and the second preset value.
Optionally, the first preset value is 1, and the second preset value is 0.
Optionally, after the processor receives that the second intrusion detection sensor reports infrared interruption information for multiple times after reporting for the first time, the processor generates the second alarm information according to the time of reporting for multiple times, the first preset value, and the second preset value, including:
for each report in the multiple reports according to the time sequence, if the time accumulation value is within a preset time range, the processor adds 1 to the value of the counter, and sets the time accumulation value as a second preset value again;
when the value of the counter is equal to a third preset value, the processor sets the time accumulation value as a second preset value again, and stores infrared interruption information reported each time after the value of the counter is greater than the third preset value;
and when the time accumulation value is greater than or equal to a fourth preset value, the processor generates second alarm information according to the stored infrared interruption information.
Optionally, the method further includes:
and the processor sends the second alarm information to the NB-IoT chip through the second communication module, and the NB-IoT chip reports the second alarm information to a server through the NB-IoT base station.
According to the intrusion monitoring device, the method and the system, the mode of adding the NB-IoT chip and the NB-IoT base station is used for replacing the mode of adding the base station to the gateway equipment in the prior art, and because the NB-IoT chip is deployed on one monitoring terminal of a monitoring field and does not need to be deployed independently, and the size of the NB-IoT chip is far smaller than that of the gateway equipment, the intrusion monitoring device reduces the occupied space. Compared with the gateway equipment, the design of the NB-IoT chip greatly reduces the power consumption, and simultaneously avoids the problem that the gateway equipment is easy to make mistakes due to the fact that software and hardware have 2 fault inlets of the MCU and the communication module, the intrusion monitoring device is self-powered by supplying power to the main control terminal and each node terminal by utilizing the energy collection principle of the EnOcean module, the problem that complicated manual maintenance work is caused by frequent failure of the battery when the battery is used for supplying power in the prior art is avoided, and the problem that the wiring cost is increased and the attractiveness is influenced due to the fact that the wiring is required to be arranged at a socket when the external adapter is used for supplying power is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a prior art intrusion monitoring system framework diagram;
FIG. 2 is a block diagram of an intrusion monitoring system according to the present invention;
fig. 3 is a schematic structural diagram of an intrusion monitoring device according to an embodiment of the present invention;
fig. 4 is a schematic flow diagram of generating first alarm information by the NB-IoT chip provided in the present invention;
fig. 5 is a schematic view of a process flow of renewing arming/disarming status provided by the present invention 1;
fig. 6 is a schematic diagram of a process of updating arming/disarming states according to the present invention 2.
Description of reference numerals:
10: a master control terminal;
20: a node terminal;
101: an NB-IoT chip;
102: a first communication module;
201: a processor;
202: a second communication module;
103: a first intrusion detection sensor;
203: a second intrusion detection sensor;
104: a first buzzer;
204: a second buzzer;
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In this application, it should be understood that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a alone, b alone, c alone, a and b combination, a and c combination, b and c combination, or a, b and c combination, wherein a, b and c can be single or multiple. In this application, it should be understood that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a alone, b alone, c alone, a and b combination, a and c combination, b and c combination, or a, b and c combination, wherein a, b and c can be single or multiple.
Fig. 1 is a block diagram of a prior art intrusion monitoring system. As shown in fig. 1, the intrusion monitoring system of the prior art includes: the system comprises an intrusion monitoring device, a base station, a server and a user terminal which are deployed on a monitoring site. The intrusion monitoring device comprises a plurality of infrared alarm devices and gateway equipment, wherein the infrared alarm devices are all connected with the gateway equipment, when one infrared alarm device detects intrusion of a person, alarm information is sent to the gateway equipment, the gateway equipment sends the alarm information to the server through the base station, and the server further sends the alarm information to the user terminal.
However, the intrusion monitoring device in the prior art has the following defects that on one hand, the gateway equipment is large in size and needs to be deployed independently, and a large space of a monitoring site is occupied; moreover, because prior art's gateway equipment adopts little the control unit MCU to add the communication module form more, and the components and parts are more can lead to the consumption great, and in addition, software and hardware all has 2 trouble entries of MCU and communication module, easily makes mistakes. On the other hand, no matter the infrared alarm device or the gateway device needs to be powered by a battery or an external adapter. If the battery is adopted, because the power consumption management is not available, the service life of the battery is basically about six months, and the frequent failure of the battery brings more complicated manual maintenance work; if an external adapter is adopted, wiring needs to be arranged at the socket, so that the wiring cost is increased and the appearance is influenced.
In view of the above technical problems in the prior art, the present invention provides an intrusion monitoring device, which includes a main control terminal and N node terminals, wherein an NB-IoT chip and a first communication module are deployed in the main control terminal, the main control terminal is connected to the N node terminals through the first communication module, and when the main control terminal detects an intrusion by a person, the NB-IoT chip generates alarm information and sends the alarm information to a server through an NB-IoT base station; when the node terminal detects that someone invades, the node terminal generates alarm information firstly, then the alarm information is sent to the NB-IoT chip, and the NB-IoT chip sends the alarm information generated by the node terminal to a server through an NB-IoT base station. The invention uses the mode of NB-IoT chip and NB-IoT base station to replace the mode of gateway equipment and base station in the prior art, because the NB-IoT chip is deployed on one monitoring terminal of the monitoring field, the NB-IoT chip does not need to be deployed independently, and the volume of the NB-IoT chip is far smaller than that of the gateway equipment, the intrusion monitoring device of the invention reduces the occupied space. And the design of NB-IoT chip has reduced the consumption greatly compared with gateway equipment, has also avoided gateway equipment simultaneously because the software and hardware all has 2 trouble entrances of MCU and communication module and the problem of easily makeing mistakes.
The intrusion monitoring device can be applied to the monitoring system shown in fig. 2, and the monitoring system shown in fig. 2 includes: the system comprises an intrusion monitoring device, an NB-IoT base station, a server and a user terminal.
The intrusion monitoring device is deployed in a monitoring site, the monitoring site can be a supermarket, a shop, a warehouse, an office and other places needing all-around monitoring of each area, and the master control terminal and the N node terminals can be respectively deployed in different areas.
The server can be an entity server or a cloud server, and can provide data push service for an application program APP installed on a user terminal, such as pushing alarm information sent by an intrusion detection device.
The user terminal can be a mobile phone, a tablet computer, a notebook computer, an intelligent watch, a television and other electronic equipment with a display screen, and only has the function of opening an Application (APP).
By way of example and not limitation, in the embodiments of the present application, the user terminal may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
The following describes the technical solution of the present invention and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings
Fig. 3 is a schematic structural diagram of an intrusion monitoring device according to an embodiment of the present invention. As shown in fig. 3, the intrusion monitoring device provided in this embodiment includes: the system comprises a main control terminal 10 and N node terminals 20, wherein N is greater than or equal to 1.
Wherein, the main control terminal 10 includes: the NB-IoT chip 101 is connected to the first communication module 102, and the master control terminal 10 is connected to the N node terminals 20 through the first communication module 102. The NB-IoT101 chip is configured to report corresponding alarm information to the server through the NB-IoT base station when the main control terminal 10 or the node terminal 20 detects that someone invades.
Specifically, when the NB-IoT chip 101 of the main control terminal 10 determines that someone invades, the NB-IoT chip 101 generates alarm information, that is, first alarm information, and sends the alarm information to the server through the NB-IoT base station in fig. 2, and the server further sends the alarm information to the user terminal. When the node terminal 20 detects that someone invades, the node terminal 20 generates alarm information, that is, second alarm information, and further sends the alarm information to the NB-IoT chip 101 of the main control terminal 10, the NB-IoT chip 101 sends the alarm information to the server through the NB-IoT base station in fig. 2, and the server further sends the alarm information to the user terminal.
No matter the master control terminal 10 or the node terminal 20 detects that someone invades, the process of sending alarm information to the user terminal does not involve gateway equipment, so the invasion monitoring device provided by the embodiment does not need to deploy gateway equipment on a monitoring field. Compared with the gateway equipment, the design of the NB-IoT chip 101 greatly reduces the power consumption, and simultaneously avoids the problem that the gateway equipment is easy to make mistakes due to the fact that software and hardware have 2 fault inlets of the MCU and the communication module.
In one possible implementation, referring to fig. 3, the node terminal 20 may include: the processor 201 is connected with the second communication module 202, and the master control terminal 10 realizes communication with the node terminal 20 through the connection of the first communication module 102 and the second communication module 202. The node terminal 20 determines whether a person invades the node terminal by the processor 201, and if so, the processor 201 generates corresponding alarm information.
In a possible implementation manner, the main control terminal 10 may further include a first intrusion detection sensor 103, where the first intrusion detection sensor 103 is connected to the NB-IoT chip 101, and the NB-IoT chip 101 may determine whether there is an intrusion in the position where the main control terminal 10 is located according to infrared interruption information detected and sent by the first intrusion detection sensor 103, and if so, generate first alarm information; accordingly, the node terminal 20 may further include: and the second intrusion detection sensor 203 is connected with the processor 201 of the node terminal 20, and the processor 201 can judge whether the node terminal 20 is in the position where the node terminal is located according to infrared interruption information detected and sent by the second intrusion detection sensor 203, and if so, generate second alarm information and send the second alarm information to the NB-IoT chip 101 through the second communication module.
Optionally, both the first intrusion detection sensor 103 deployed in the master control terminal 10 and the second intrusion detection sensor 203 deployed in the node terminal 20 may be infrared sensors.
The following describes a process of generating first alarm information by the NB-IoT chip 101 in the main control terminal 10:
step a1, after the NB-IoT chip 101 receives the first report of the infrared interruption information from the first intrusion detection sensor 103, the value of the counter is updated to the first preset value, and the time accumulation value is set to the second preset value, and the time accumulation value is accumulated over time.
Optionally, the first preset value may be 1, and the second preset value may be 0.
And step B1, after the NB-IoT chip 101 receives the infrared interruption information reported for multiple times after the first intrusion detection sensor 103 reports for the first time, judging whether intrusion exists according to the time reported for multiple times, the first preset value and the second preset value, and if yes, generating first alarm information according to the time reported for multiple times, the first preset value and the second preset value.
Specifically, for each report in the multiple reports according to the time sequence, if the time accumulation value is within a preset time range, the NB-IoT chip adds 1 to the value of the counter, and sets the time accumulation value to a second preset value again; and when the value of the counter is equal to a third preset value, the NB-IoT chip sets the time accumulation value to a second preset value again, stores the infrared interruption information reported each time after the value of the counter is greater than the third preset value, and when the value of the time accumulation value is greater than or equal to a fourth preset value, the NB-IoT chip generates the first alarm information according to the stored infrared interruption information.
The process of step A1-step B1 described above is described below with reference to FIG. 4:
and S401, initializing after the NB-IoT chip 101 reports the alarm information to the server last Time, clearing the value of the Counter, clearing the Time accumulation value Time, and automatically accumulating the Time accumulation value Time along with the Time.
S402, after the NB-IoT chip 101 receives the first report of the infrared interruption information from the first intrusion detection sensor 103, it updates the Counter value to 1, and sets the Time accumulation value Time to zero.
S403, when the NB-IoT chip 101 receives the infrared interruption information reported by the first intrusion detection sensor 103 again, determining whether the value of the Time accumulation value Time is smaller than the preset threshold X, for example, 2min, if so, not processing the infrared interruption information reported this Time, that is, the NB-IoT chip 101 does not process the infrared interruption information received within 2min after receiving the infrared interruption information last Time, and if the value of the Time accumulation value Time has been accumulated to the preset Time range X +2 ≧ Time ≧ X (for example, [2min,4min ]), adding 1 to the value of the counter, and setting the Time accumulation value Time to zero again.
S404, when the outside line interruption information is received next, the same processing as S403 is performed, and the Time accumulation Time is set to zero again until the value of the Counter equals to a third preset value Y (for example, 3).
S405, storing the infrared interruption information reported each time by the first intrusion detection sensor 103 after the value of the Counter is greater than the third preset value Y.
And S406, when the Time accumulation value Time is greater than or equal to a fourth preset value Z (for example, 30min), determining that someone invades, and reporting all the stored infrared interruption information serving as first alarm information to the server.
The method for generating the first alarm information in S404-S406 avoids processing excessive redundant messages and reduces power consumption.
In a possible implementation manner, when the NB-IoT chip 101 reports the first alarm information to the server or sends a heartbeat to the server, as shown in fig. 5, it may be determined whether the current arming state needs to be updated to disarming in the following manner:
s501, checking whether a disarming command is cached in the server; if yes, go to step S502.
S502, update the state of the NB-IoT chip 101 to be revoked, and broadcast a state update message to each node terminal 20 through the first communication module 102, so that each node terminal 20 updates the state to be revoked.
S503, if the error message of changing the state fed back by any node terminal 20 is received within a preset time period (for example, 5S), sending the state update message to the corresponding node terminal 20 again until the node terminal 20 does not feed back the error message of changing the state within the preset time period.
Optionally, if the NB-IoT chip 101 resends the status update message to the node terminal feeding back the status change error message more than N times, and the corresponding node terminal 20 still feeds back the status change error message within the preset time period, the NB-IoT chip 101 reports a command to the server to set an error alarm.
Accordingly, if the intrusion monitoring device is currently in the disarmed state, and the NB-IoT chip 101 sends a heartbeat to the server, it can also be determined whether the current disarmed state needs to be updated to arming in a manner similar to S501-S503:
s601, checking whether a defense deploying command is cached in the server; if yes, go to step S602.
S602, update the state of the NB-IoT chip 101 to arming, and broadcast a state update message to each node terminal 20 through the first communication module 102, so that each node terminal 20 updates the state to arming.
S603, if a status change error message fed back by any node terminal 20 is received within a preset time period (for example, 5S), sending the status update message to the corresponding node terminal 20 again until the node terminal 20 does not feed back the status change error message within the preset time period.
Optionally, if the NB-IoT chip 101 resends the status update message to the node terminal feeding back the status change error message more than N times, and the corresponding node terminal 20 still feeds back the status change error message within the preset time period, the NB-IoT chip 101 reports a command to the server to set an error alarm.
Optionally, the main control terminal 10 may default to send a heartbeat every C hours (the value C is default to 0.5) in a time period from point a (the value a is default to 9) to point B (the value B is default to 21) every day, and send a heartbeat every D hours (the value D is default to 2) in the rest of the time period, so that the main control terminal can receive a server command immediately in the daytime and avoid false alarm caused by the user not leaving the site, and power consumption can be reduced at night.
When a user needs to change the arming/disarming state of the intrusion monitoring device, the user can send a command to the server, the server caches the command, and the arming/disarming states of the main control terminal and the node terminal are changed by checking the command when the main control terminal 10 reports heartbeat or alarm information. It should be noted that: the main control terminal 10 may also support the user to set a fixed defense period every day, in which case, the server controls the intrusion monitoring device to be in an on state in the defense period, and controls the intrusion monitoring device to be in an off state in a period other than the defense period.
For the process of generating the second alarm information by processor 201 in node terminal 20, the process may include:
in step a2, after receiving the first report of the infrared interruption information from the second intrusion detection sensor 203, the processor 201 sets the value of the counter to a first preset value, and sets the time accumulation value to a second preset value, where the time accumulation value is accumulated over time.
Optionally, the first preset value is 1, and the second preset value is 0.
Step B2, after the processor 201 receives the infrared interruption information reported many times after the first report by the second intrusion detection sensor 203, it determines whether there is an intrusion according to the time of the multiple reports, the first preset value, and the second preset value, and if so, generates the second alarm information according to the time of the multiple reports, the first preset value, and the second preset value.
Specifically, for each report in the multiple reports according to the time sequence, if the time accumulation value is within a preset time range, adding 1 to the value of the counter, and setting the time accumulation value as a second preset value again; and when the value of the counter is equal to a third preset value, setting the time accumulation value as a second preset value again, storing infrared interruption information reported each time after the value of the counter is greater than the third preset value, and when the time accumulation value is greater than or equal to a fourth preset value, generating second alarm information according to the stored infrared interruption information.
Further, the processor 201 sends the second alarm information to the NB-IoT chip 101 through the second communication module 202, and the NB-IoT chip 101 reports to a server through the NB-IoT base station.
Specifically, the process of generating the second alarm information by the processor 201 according to the infrared interruption information reported by the second intrusion detection sensor 203 may refer to the process of generating the first alarm information by the NB-IoT chip 101 according to the infrared interruption information reported by the first intrusion detection sensor 103 in fig. 4, which is not described herein again.
In a possible implementation manner, the main control terminal 10 may further include a first buzzer 104, and each node terminal 20 may further include a second buzzer 204. The first buzzer 104 of the main control terminal 10 is connected to the NB-IoT chip 101, and when the NB-IoT chip 101 determines that someone invades, the NB-IoT chip sends a control instruction to the first buzzer 104, so that the first buzzer 104 gives an alarm. The second buzzer 204 is connected to the processor 201 of the node terminal 20, and when the processor 201 determines that the person invades, the processor 201 sends a control instruction to the second buzzer 204 to enable the second buzzer 204 to give an alarm.
Optionally, the first communication module 102 and the second communication module 202 are both energy harvesting EnOcean modules. Because the EnOcean module has an energy collection function, the EnOcean module can be used for supplying power to the main control terminal 10 and each node terminal 20, so that the intrusion monitoring device can realize self-power supply. The problem of the power supply of adopting the battery among the prior art because the battery frequently became invalid and bring more loaded down with trivial details manual maintenance work to and need to lay wire and the problem that the wiring cost that leads to and influence pleasing to the eye is located to the socket to the wiring when adopting external adapter power supply is avoided. The principle of energy collection by the EnOcean module is described in the prior art, and the present invention is not described herein again.
Optionally, the processor 201 disposed on each node terminal 20 may be an open source central processing unit 201 OpenCPU.
Optionally, the first intrusion detection sensor 103 is connected to the NB-IoT chip 101 through an external interrupt pin of the NB-IoT chip, the first communication module 102 is connected to the NB-IoT chip 101 through a UART, and the first buzzer 104 is connected to the NB-IoT chip 101 through a digital bus; correspondingly, the second intrusion detection sensor 203 is connected with the processor 201 through an external interrupt pin of the processor 201, the second communication module 202 is connected with the processor 201 through a Universal Asynchronous Receiver Transmitter (UART), and the second buzzer 204 is connected with the processor 201 through a digital bus.
The intrusion monitoring device and the method provided by the invention use the mode of NB-IoT chip and NB-IoT base station to replace the mode of gateway equipment and base station in the prior art, because the NB-IoT chip is deployed on one monitoring terminal of the monitoring field, the NB-IoT chip does not need to be deployed independently, and the volume of the NB-IoT chip is far smaller than that of the gateway equipment, the intrusion monitoring device reduces the occupied space. Compared with the gateway equipment, the design of the NB-IoT chip greatly reduces the power consumption, and simultaneously avoids the problem that the gateway equipment is easy to make mistakes due to the fact that software and hardware have 2 fault inlets of the MCU and the communication module, the intrusion monitoring device is self-powered by supplying power to the main control terminal and each node terminal by utilizing the energy collection principle of the EnOcean module, the problem that complicated manual maintenance work is caused by frequent failure of the battery when the battery is used for supplying power in the prior art is avoided, and the problem that the wiring cost is increased and the attractiveness is influenced due to the fact that the wiring is required to be arranged at a socket when the external adapter is used for supplying power is solved.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (18)

1. An intrusion monitoring device, comprising:
the system comprises a main control terminal and N node terminals, wherein N is more than or equal to 1;
wherein, the main control terminal includes: the narrow-band Internet of things system comprises a narrow-band Internet of things (NB-IoT) chip and a first communication module, wherein the NB-IoT chip is connected with the first communication module, and the master control terminal is connected with the N node terminals through the first communication module;
and the NB-IoT chip is used for reporting corresponding alarm information to a server through an NB-IoT base station when the main control terminal or the node terminal detects the invasion of a person.
2. The intrusion monitoring device according to claim 1, wherein the main control terminal further comprises: a first intrusion detection sensor;
the first intrusion detection sensor is connected with the NB-IoT chip, the first intrusion detection sensor is used for detecting infrared ray interruption information and sending the infrared ray interruption information to the NB-IoT chip, the NB-IoT chip is used for judging whether a person intrudes according to the infrared ray interruption information, and if yes, first alarm information is generated.
3. The intrusion monitoring device according to claim 1 or 2, wherein the main control terminal further comprises: a first buzzer;
the first buzzer is connected with the NB-IoT chip and used for giving an alarm according to a control instruction sent by the NB-IoT chip.
4. The intrusion monitoring device according to claim 3, wherein the node terminal includes: the system comprises a processor, a second communication module and a second intrusion detection sensor;
the second communication module and the second intrusion detection sensor are connected with the processor, the second intrusion detection sensor is used for detecting infrared interruption information and sending the infrared interruption information to the processor, the processor is used for judging whether a person intrudes according to the infrared interruption information, if yes, second alarm information is generated, and the second alarm information is sent to the NB-IoT chip through the second communication module.
5. The intrusion monitoring device of claim 4, wherein the node terminal further comprises: a second buzzer;
the second buzzer is connected with the processor and used for giving an alarm according to the control instruction sent by the processor.
6. The intrusion monitoring device of claim 4 wherein the first and second communication modules are energy harvesting EnOcean modules.
7. The intrusion monitoring device according to claim 6, wherein the processor is an open source central processing unit, OpenCPU.
8. The intrusion monitoring device of claim 4, wherein the first and second intrusion detection sensors are infrared sensors.
9. The intrusion monitoring device according to claim 4, wherein the first intrusion detection sensor is connected to the NB-IoT chip through an external interrupt pin of the NB-IoT chip, the first communication module is connected to the NB-IoT chip through a UART, and the first buzzer is connected to the NB-IoT chip through a digital bus;
the second intrusion detection sensor passes through the outside interrupt pin of treater with the treater is connected, the second communication module pass through general asynchronous receiving and dispatching transmitter UART with the treater is connected, the second bee calling organ pass through digital bus with the treater is connected.
10. An intrusion monitoring system comprising: the intrusion monitoring device, the NB-IoT base station, the server, and the user terminal of any of claims 1-9.
11. An intrusion monitoring method applied to the intrusion monitoring device according to any one of claims 1 to 9, comprising:
after the NB-IoT chip receives the infrared interruption information reported by the first intrusion detection sensor for the first time, updating the value of the counter to a first preset value, and setting a time accumulation value as a second preset value, wherein the time accumulation value is accumulated along with time;
and after the NB-IoT chip receives the infrared interruption information reported for multiple times after the first intrusion detection sensor reports for the first time, generating the first alarm information according to the time reported for multiple times, the first preset value and the second preset value.
12. The method of claim 11, wherein after the NB-IoT chip receives infrared interruption information reported multiple times after the first intrusion detection sensor reports for the first time, generating the first alarm information according to the time of the multiple reports, the first preset value, and the second preset value, and includes:
for each report in the multiple reports according to the time sequence, if the time accumulation value is within a preset time range, the NB-IoT chip adds 1 to the value of the counter, and the time accumulation value is set to be a second preset value again;
when the value of the counter is equal to a third preset value, the NB-IoT chip sets the time accumulation value to be a second preset value again, and stores infrared interruption information reported each time after the value of the counter is greater than the third preset value;
and when the time accumulation value is greater than or equal to a fourth preset value, the NB-IoT chip generates the first alarm information according to the stored infrared ray interruption information.
13. The method of claim 11 or 12, further comprising:
and the NB-IoT chip reports the first alarm information to a server through the NB-IoT base station.
14. The method of claim 13, further comprising:
the NB-IoT chip checks whether a disarming command is cached in the server;
if yes, the NB-IoT chip updates the state of the NB-IoT chip to disarming, and broadcasts a state updating message to each node terminal through the first communication module so that each node terminal updates the state to disarming;
if the status change error message fed back by any node terminal is received within a preset time period, the NB-IoT chip sends the status update message to the corresponding node terminal again until the node terminal does not feed back the status change error message within the preset time period.
15. The method of claim 11, wherein before the NB-IoT chip receives the first report of ir outage information from the first intrusion detection sensor, the method further comprises:
the NB-IoT chip checks whether a defense command is cached in the server;
if yes, updating the state of the NB-IoT chip to be defense deployment, and broadcasting a state updating message to each node terminal through the first communication module so that each node terminal updates the state to be defense deployment;
and if the status change error message fed back by any node terminal is received within a preset time period, the NB-IoT chip sends the status update message to the corresponding node terminal again until all the node terminals do not feed back the status change error message within the preset time period.
16. An intrusion monitoring method applied to the intrusion monitoring device according to any one of claims 1 to 9, comprising:
after the processor receives the infrared interruption information reported by the second intrusion detection sensor for the first time, updating the value of the counter to a first preset value, and setting a time accumulation value as a second preset value, wherein the time accumulation value is accumulated along with time;
and after the processor receives the infrared interruption information reported for multiple times after the first report of the second intrusion detection sensor, generating second alarm information according to the time reported for multiple times, the first preset value and the second preset value.
17. The method of claim 16, wherein the generating, by the processor, the second alarm information according to the time of the multiple reports, the first preset value, and the second preset value after receiving the multiple reports of the infrared interruption information after the first report of the second intrusion detection sensor comprises:
for each report in the multiple reports according to the time sequence, if the time accumulation value is within a preset time range, the processor adds 1 to the value of the counter, and sets the time accumulation value as a second preset value again;
when the value of the counter is equal to a third preset value, the processor sets the time accumulation value as a second preset value again, and stores infrared interruption information reported each time after the value of the counter is greater than the third preset value;
and when the time accumulation value is greater than or equal to a fourth preset value, the processor generates second alarm information according to the stored infrared interruption information.
18. The method of claim 16 or 17, further comprising:
and the processor sends the second alarm information to the NB-IoT chip through the second communication module, and the NB-IoT chip reports the second alarm information to a server through the NB-IoT base station.
CN201911296260.7A 2019-12-16 2019-12-16 Intrusion monitoring device, method and system Pending CN110942576A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911296260.7A CN110942576A (en) 2019-12-16 2019-12-16 Intrusion monitoring device, method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911296260.7A CN110942576A (en) 2019-12-16 2019-12-16 Intrusion monitoring device, method and system

Publications (1)

Publication Number Publication Date
CN110942576A true CN110942576A (en) 2020-03-31

Family

ID=69911151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911296260.7A Pending CN110942576A (en) 2019-12-16 2019-12-16 Intrusion monitoring device, method and system

Country Status (1)

Country Link
CN (1) CN110942576A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784953A (en) * 2020-09-07 2020-10-16 四川科道芯国智能技术股份有限公司 Infrared monitoring device and alarm system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784953A (en) * 2020-09-07 2020-10-16 四川科道芯国智能技术股份有限公司 Infrared monitoring device and alarm system

Similar Documents

Publication Publication Date Title
CA2707169C (en) Wireless takover of wired alarm system components
CN104080027B (en) Earphone firmware is updated from earphone base unit
CN106062614B (en) It is detected on the head of head-mounted display
US9240120B2 (en) Caregiver rounding with real time locating system tracking
CN103533167B (en) Method and system for intelligently turning prompt off according to current state of user
US20140225731A1 (en) Monitoring System using Wireless Sensor Satellite Modules
CN109374053B (en) Internet of things machine room management platform based on event-driven response
CN108994840A (en) Failed machines people rescue skills and device
KR101008707B1 (en) The steal prevention and monitoring system using rfid and zigbee and gps and the method thereof
CN211403551U (en) Intrusion monitoring device and system
CN106851947A (en) A kind of roam lamp control device based on NB-IoT
KR100867864B1 (en) Ubiquitous sensor network unity control system and method thereof
CN106324530A (en) Power supply detection method and device
CN110942576A (en) Intrusion monitoring device, method and system
CN103942903A (en) Data acquisition processing device, system and method with anti-theft function
JP6794019B2 (en) Abnormal communication system of distribution board
EP3449461A1 (en) Wireless device based auto check-in and information sourcing system for accountability management
KR101678141B1 (en) Apparatus for preventing theft of electric devices
CN106503758B (en) Article loss prevention method and system and electronic tag
JP5934068B2 (en) Communication terminal device and fixed telephone system
JP6953014B2 (en) signage
KR101482912B1 (en) Electric sign control systems utilizing vision boards with uninterruptible power supply
CN206193209U (en) Thing networking power management system
JP2001101557A (en) Remote monitoring device
CN210693993U (en) On-vehicle POE switch

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination