CN111540177A - Anti-hijack alarm method and system based on information identification - Google Patents
Anti-hijack alarm method and system based on information identification Download PDFInfo
- Publication number
- CN111540177A CN111540177A CN202010321609.4A CN202010321609A CN111540177A CN 111540177 A CN111540177 A CN 111540177A CN 202010321609 A CN202010321609 A CN 202010321609A CN 111540177 A CN111540177 A CN 111540177A
- Authority
- CN
- China
- Prior art keywords
- information
- identification
- hijack
- identified
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses an anti-hijack alarm method and system based on information identification, and belongs to the technical field of information identification. The method comprises the following steps: acquiring first to-be-identified information of a first object; the first to-be-identified information of the first object is consistent with the set first identification information in comparison; then judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object; wherein N is an integer, and N is more than or equal to 2. The technical scheme of the invention is easy to trigger the anti-hijack function, and is convenient for rescuing the hijacked user in time.
Description
Technical Field
The invention relates to the technical field of information identification, in particular to an anti-hijack alarm method and an anti-hijack alarm system based on information identification.
Background
The intelligent lock industry develops rapidly, and has the requirement of anti-hijack function based on the use scene of a user, the existing anti-hijack technology of the intelligent lock industry adopts a specific password or a specific fingerprint to judge whether the user is hijacked, and the face anti-hijack technology is a blank. At present, with the development of digital technology, electronic locks such as fingerprints, coded locks, card locks and the like are popular in the market, but the anti-hijacking alarm reporting function is blank in the market, and part of electronic door locks with switch output interfaces are also available in the market, so that the locks can send out alarm sirens after errors can be input for many times, but the locks do not have the alarm reporting function. The traditional electronic lock has limitation in alarm mode, only has the alarm function of the alarm bell of the traditional electronic lock, and basically cannot play the actual warning or help seeking role in sound and light alarm under the current social environment. Secondly, the anti-theft technology in modern life adopts the alarm bell to alarm, users have learned about the surrounding alarm sound, and few people pay attention to the alarm bell, so that the alarm bell cannot play the due alarm function. Moreover, police bells and other sounds can be annoying to banderolers.
At present, along with the development of digital technology, electronic locks such as magnetic cards, fingerprints and passwords are popular in the market, but the intelligent lock for hijacking and automatically alarming is blank in the market, and partial electronic door locks with alarming functions are also available in the market. The password input mode of the traditional password lock has limitations, firstly, when a person is hijacked and is forced to open the door, the door can not be opened, the robber can threaten the door, and people around the door can not dare to alarm because of the threatened door; secondly, even if the coded lock is based on an alarm function and also alarms by an alarm bell, users have learned that the alarm sound around the coded lock is normal, few people pay attention to the alarm bell, so that the alarm bell cannot alarm, and the fixed key-type code is easy to steal.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problem, the invention provides an anti-hijack alarm method and an anti-hijack alarm system based on information identification. The anti-hijack function is easy to trigger, and the hijacked user can be rescued in time.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
an anti-hijack alarm method based on information identification comprises the following steps: acquiring first to-be-identified information of a first object; the first to-be-identified information of the first object is consistent with the set first identification information in comparison; then judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object; wherein N is an integer, and N is more than or equal to 2.
Preferably, the first information to be identified is face information; the set first identification information is face information prestored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is face information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring face information of a first object; the face information of the first object is consistent with face information prestored by the first object in comparison; then judging: whether the number of times of acquiring or identifying the face information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the face information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be identified is fingerprint information; the set first identification information is fingerprint information of a first finger pre-stored by a first object; when the first information to be identified is fingerprint information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: collecting fingerprint information of a first object; the fingerprint information of the first object is compared with the fingerprint information of a first finger prestored by the first object; then judging: whether the number of times of first-item, collection or identification of fingerprint information of a first object exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be identified is iris information; the set first identification information is the iris information pre-stored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is iris information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring iris information of a first object; comparing the iris information of the first object with the iris information prestored in the first object to be consistent; then judging: first, whether the number of times of acquiring or identifying the iris information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the iris information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be identified is entrance guard card information; the set first identification information is access control card information pre-stored by the first object; when the first information to be identified is access control card information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring access card information of a first object; the access control card information of the first object is consistent with the access control card information prestored by the first object in comparison; then judging: the method comprises the steps of firstly, acquiring or identifying whether the number of times of access control card information of a first object exceeds a set value N; whether the second and the first object stay time exceeds the set time T; if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be recognized is voice information; the set first identification information is voice information pre-stored by the first object; the first abnormal identification information is anti-hijack voice information of a first object; when the first information to be identified is voice information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: collecting voice information of a first object; the voice information of the first object is compared with the pre-stored voice information of the first object to be consistent; then judging: whether the number of times of acquiring or identifying the voice information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack voice information of the first object exists in the voice information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be recognized is gesture information; the set first identification information is gesture information pre-stored by a first object; the first abnormal identification information is anti-hijack gesture information of a first object; when the first information to be identified is gesture information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring gesture information of a first object; the gesture information of the first object is consistent with gesture information prestored by the first object in comparison; then judging: whether the number of times of acquiring or identifying gesture information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack gesture information of the first object exists in the gesture information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
An anti-hijack alarm system based on information identification according to the above anti-hijack alarm method based on information identification comprises: the identification information acquisition module is used for acquiring first to-be-identified information of a first object; the identification information comparison module is used for comparing whether the first to-be-identified information of the first object is consistent with the set first identification information or not; the anti-hijack information judgment module is used for judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged; and the alarm information sending module is used for sending the anti-hijack alarm information to the second object if the anti-hijack information judging module judges that at least one of the first strip, the second strip and the third strip is yes.
Preferably, the mobile terminal further comprises an identification information storage module for storing the set value N, the set time T, the set first identification information and the first abnormality identification information of the first object. The first identification information and the first abnormal identification information of the first object are stored in advance; for use at the moment of the hijacked crisis.
Preferably, if the comparison result of the identification information comparison module fails, the identification information comparison module sends information that the comparison fails to pass to the second object through the alarm information sending module.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
the embodiment of the application provides an anti-hijack alarm method and system based on information identification, which can trigger an anti-hijack alarm function without the detection of a hijack person and is convenient for rescuing the hijacked user in time.
Drawings
Fig. 1 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 1 of the present invention;
fig. 2 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 2 of the present invention;
fig. 3 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 3 of the present invention;
fig. 4 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 4 of the present invention;
fig. 5 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 5 of the present invention;
fig. 6 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 6 of the present invention;
fig. 7 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 7 of the present invention;
fig. 8 is a schematic structural diagram of an anti-hijack alarm system based on information identification according to embodiment 8 of the present invention;
fig. 9 is a schematic structural diagram of an anti-hijack alarm system based on information identification according to embodiment 9 of the present invention;
fig. 10 is a flowchart of an anti-hijack alarm method based on information identification according to a preferred embodiment of the present invention 8;
fig. 11 is a schematic structural diagram of an anti-hijack alarm system based on information identification according to an embodiment 8 of the present invention.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 1, including:
s101, collecting first to-be-identified information of a first object;
s102, comparing the first to-be-identified information of the first object with set first identification information;
then judging: s103, whether the frequency of collecting or identifying the first information to be identified exceeds a set value N or not is judged; s104, whether the first object staying time exceeds the set time T or not; s105, whether first abnormal identification information of the set first object exists in the first to-be-identified information of the first object or not;
if at least one of S103-S105 is yes, S106, sending anti-hijack alarm information to a second object; wherein N is an integer, and N is more than or equal to 2; in specific application, N can be numbers such as 2, 3, 4, 5, 6, 7 and the like; t can be ms or s, such as 30ms, 1s, etc.
The anti-hijack alarm method based on information identification can be applied to occasions or fields where hardware such as intelligent locks, coded locks and the like are located, the first information to be identified can be biological characteristic information of a human body, such as human faces, fingerprints, irises and the like, and can also be cards utilizing a near field communication technology. The set first identification information is real first identification information which is preset and stored in an identification module of the hardware to be started. And when one of the first, second and third persons is yes, judging that the first object is hijacked, and sending alarm information to the second object. Wherein, the second object can be family, friend, or emergency contact of the first object; the judgment conditions of the first strip, the second strip and the third strip can be realized in emergency without the awareness of a hijacker. N can take values of 2, 3, 4 and the like, but the value of N is not too large, so that the condition that the hijacker waits too long and is irritated to generate adverse results is avoided. The value of the set time T is slightly larger than the time spent on one-time identification and passing at ordinary times, for example, the time spent on identifying and passing at most 2 seconds at ordinary times, and then the set time T can be set to be longer than 2 seconds so as to send out alarm information under the condition that a gangster cannot detect the alarm information. Setting first abnormal identification information of a first object, for example, eye closing action during iris identification, for example, eye closing action during face identification, or left-right shaking action and the like, which are different from ordinary unlocking actions; if the door of the access control card is opened, the staying time of the access control card at the identification module is slightly longer than the passing time of the identification at ordinary times.
In S106, the method of sending the anti-hijack alarm information to the second object may be sending a short message, sending a WeChat, automatically making a call, and the like to prompt the second object. The actual use frequency and use habit of the relevant handheld mobile equipment such as a mobile phone and the like can be set according to the second object. The content of the anti-hijack alarm information includes but is not limited to: identity information such as a name and a face image of the first object, position information of the first object, and the like; may also be based on the first object.
Example 2
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 2, on the basis of embodiment 1, the following improvements can be made: the first information to be identified is face information; the set first identification information is face information prestored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is face information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s201, collecting face information of a first object; s202, comparing the face information of the first object with face information prestored in the first object to be consistent;
then judging: s203, whether the frequency of acquiring or identifying the face information of the first object exceeds a set value N or not is judged; s204, whether the first object staying time exceeds the set time T or not; s205, whether the set blink action information of the first object exists in the face information of the first object or not;
and if at least one of S203-S205 is yes, S206, sending anti-hijack alarm information to the second object.
Example 3
The embodiment proposes an anti-hijack alarm method based on information identification, as shown in fig. 3, on the basis of the embodiment 1 or 2, the following improvements can be made: the first information to be identified is fingerprint information; the set first identification information is fingerprint information of a first finger pre-stored by a first object; when the first information to be identified is fingerprint information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s301, collecting fingerprint information of a first object;
s302, comparing the fingerprint information of the first object with the fingerprint information of a first finger pre-stored in the first object to be consistent;
then judging: s303, whether the number of times of collecting or identifying the fingerprint information of the first object exceeds a set value N or not is judged; s304, whether the first object staying time exceeds the set time T or not;
and if at least one of S303 and S304 is yes, S305, sending anti-hijack alarm information to the second object.
Example 4
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 4, on the basis of any one of the technical solutions of embodiments 1 to 3, the following can be improved: the first information to be identified is iris information; the set first identification information is the iris information pre-stored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is iris information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s401, collecting iris information of a first object;
s402, comparing the iris information of the first object with the iris information prestored in the first object to be consistent;
then judging: s403, whether the number of times of collecting or identifying the iris information of the first object exceeds a set value N or not is judged; s404, whether the first object staying time exceeds the set time T or not; s405, whether the set blink action information of the first object exists in the iris information of the first object or not;
and if at least one of S403 to S405 is yes, S406, sending anti-hijack alarm information to the second object.
Example 5
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 5, on the basis of any one of the technical solutions of embodiments 1 to 4, the following can be improved: the first information to be identified is entrance guard card information; the set first identification information is access control card information pre-stored by the first object; when the first information to be identified is access control card information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s501, collecting entrance guard card information of a first object;
s502, comparing the access control card information of the first object with the access control card information prestored in the first object to be consistent;
then judging: s503, whether the number of times of acquiring or identifying the access control card information of the first object exceeds a set value N or not is judged; s504, whether the first object staying time exceeds the set time T or not;
and if at least one of S503 and S504 is yes, S505, sending anti-hijack alarm information to the second object.
Example 6
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 6, on the basis of any one of the technical solutions in embodiments 1 to 6, the following can be improved: the first information to be identified is voice information; the set first identification information is voice information pre-stored by the first object; the first abnormal identification information is anti-hijack voice information of a first object; when the first information to be identified is voice information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s601, collecting voice information of a first object;
s602, comparing the voice information of the first object with the pre-stored voice information of the first object to be consistent;
then judging: s603, whether the frequency of collecting or identifying the voice information of the first object exceeds a set value N or not is judged; s604, judging whether the first object staying time exceeds the set time T or not; s605, whether the set anti-hijack voice information of the first object exists in the voice information of the first object or not;
and if at least one of S603 to S605 is yes, S606, sending anti-hijack alarm information to the second object.
Example 7
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 7, on the basis of any one of the technical solutions in embodiments 1 to 6, the following improvements can be made: the first information to be recognized is gesture information; the set first identification information is gesture information pre-stored by a first object; the first abnormal identification information is anti-hijack gesture information of a first object; when the first information to be identified is gesture information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s701, acquiring gesture information of a first object;
s702, comparing the gesture information of the first object with gesture information prestored in the first object to be consistent;
then judging: s703, acquiring or identifying whether the number of times of the gesture information of the first object exceeds a set value N; s704, whether the first object staying time exceeds the set time T or not; s705, whether set anti-hijack gesture information of the first object exists in the gesture information of the first object or not;
if at least one of S703 to S705 is yes, S706 sends anti-hijack alarm information to the second object.
Example 8
This embodiment proposes an anti-hijack alarm system based on information identification, as shown in fig. 8, which corresponds to the anti-hijack alarm method based on information identification described in any one of embodiments 1 to 7, and includes:
the identification information acquisition module is used for acquiring first to-be-identified information of a first object;
the identification information comparison module (a built-in comparison method, such as a face recognition algorithm) is used for comparing whether the first to-be-identified information of the first object is consistent with the set first identification information;
the anti-hijack information judgment module is used for judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged;
and the alarm information sending module is used for sending the anti-hijack alarm information to the second object if the anti-hijack information judging module judges that at least one of the first strip, the second strip and the third strip is yes.
When the intelligence lock includes a prevent hijack alarm system based on information identification, still include mechanical structure and wireless signal transmission module such as human proximity sensor, button detection module, motor drive module, wireless signal transmission module, power module, lock body, shell handle: a WIFI module, an NB-IoT module narrowband cellular Internet of things, a 2G module and the like.
A corresponding anti-hijack alarm method based on information identification, as shown in fig. 10, includes:
s801, judging whether a person approaches; if yes, S802, an identification information comparison module of a built-in face identification algorithm judges whether the user is the user; if not, S8021, adding 1 to the number of identification errors;
s8022, judging whether the error frequency reaches a preset maximum value; if not, repeating the step S802; if yes, S8023, locking the system for 3 minutes; then steps S801 and S802 are repeated;
if the judgment in the step S802 is yes, S803, judging whether the collected picture has eye closing action in the process of identifying; if not, repeating the step S8021 and the step S8022;
if the judgment in the step S803 is yes, S804, judging whether the eyes of the user are closed for more than 1 second; if not, S805, normally opening the door and uploading a door opening record; if yes, S806, normally opening the door, informing other users of the imperceptible transmission of the hijacked message of the user, and transmitting the hijacked message to the mobile phones of the other users through the wireless module. For example, if the eyes are closed for more than 1 second, the user a is hijacked, the hijacked information of the user a is reported to the server through the wireless module, and the server informs other users in the forms of short messages, APP message reminding and the like, so that the user a is timely rescued.
The anti-hijack alarm method based on information identification can be simplified as shown in fig. 11, and includes:
1. the face recognition module collects original pictures and converts the pictures into target files, namely, whether people approach the intelligent lock is detected by the human body proximity sensor, and if people approach the intelligent lock, the face recognition module executes the following steps:
2. extracting a characteristic value in the target file, namely prompting a user to verify a face by a lockset voice, and closing eye recognition if the user A is hijacked; the face recognition module collects face information, judges whether the user is input through a face recognition algorithm, and executes the following steps if the user is input:
3. comparing the characteristic values through an eye closing detection algorithm, and judging whether an eye closing action exists or not; namely, whether the user A has eye closing action is collected, judged and verified through a face recognition algorithm.
Example 9
The embodiment provides an anti-hijack alarm system based on information identification, as shown in fig. 9, based on the technical solution of embodiment 8, the following can be improved: the device also comprises an identification information storage module which is used for storing the set value N, the set time T, the set first identification information and the first abnormal identification information of the first object. The first identification information and the first abnormal identification information of the first object are stored in advance; for use at the moment of the hijacked crisis.
Example 10
The embodiment provides an anti-hijack alarm system based on information identification, which can be improved on the basis of the technical scheme of the embodiment 8 or 9 as follows: and if the comparison result of the identification information comparison module does not pass, the identification information comparison module sends information that the comparison does not pass to a second object through an alarm information sending module.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (10)
1. An anti-hijack alarm method based on information identification is characterized by comprising the following steps:
acquiring first to-be-identified information of a first object;
the first to-be-identified information of the first object is consistent with the set first identification information in comparison;
then judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object; wherein N is an integer, and N is more than or equal to 2.
2. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is face information; the set first identification information is face information prestored by the first object; the first abnormal identification information is blink action information of the first object;
when the first information to be identified is face information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring face information of a first object;
the face information of the first object is consistent with face information prestored by the first object in comparison;
then judging: whether the number of times of acquiring or identifying the face information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the face information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
3. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is fingerprint information; the set first identification information is fingerprint information of a first finger pre-stored by a first object; when the first information to be identified is fingerprint information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
collecting fingerprint information of a first object;
the fingerprint information of the first object is compared with the fingerprint information of a first finger prestored by the first object;
then judging: whether the number of times of first-item, collection or identification of fingerprint information of a first object exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T;
if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
4. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is iris information; the set first identification information is the iris information pre-stored by the first object; the first abnormal identification information is blink action information of the first object;
when the first information to be identified is iris information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring iris information of a first object;
comparing the iris information of the first object with the iris information prestored in the first object to be consistent;
then judging: first, whether the number of times of acquiring or identifying the iris information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the iris information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
5. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is entrance guard card information; the set first identification information is access control card information pre-stored by the first object;
when the first information to be identified is access control card information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring access card information of a first object;
the access control card information of the first object is consistent with the access control card information prestored by the first object in comparison;
then judging: the method comprises the steps of firstly, acquiring or identifying whether the number of times of access control card information of a first object exceeds a set value N; whether the second and the first object stay time exceeds the set time T;
if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
6. An anti-hijacking alarm method based on information identification according to any one of claims 1-5, characterized in that: the first information to be identified is voice information; the set first identification information is voice information pre-stored by the first object; the first abnormal identification information is anti-hijack voice information of a first object;
when the first information to be identified is voice information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
collecting voice information of a first object;
the voice information of the first object is compared with the pre-stored voice information of the first object to be consistent;
then judging: whether the number of times of acquiring or identifying the voice information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack voice information of the first object exists in the voice information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
7. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be recognized is gesture information; the set first identification information is gesture information pre-stored by a first object; the first abnormal identification information is anti-hijack gesture information of a first object;
when the first information to be identified is gesture information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring gesture information of a first object;
the gesture information of the first object is consistent with gesture information prestored by the first object in comparison;
then judging: whether the number of times of acquiring or identifying gesture information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack gesture information of the first object exists in the gesture information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
8. An anti-hijack alarm system based on information identification is characterized in that: an anti-hijacking alarm method based on information identification according to any one of claims 1-7, comprising:
the identification information acquisition module is used for acquiring first to-be-identified information of a first object;
the identification information comparison module is used for comparing whether the first to-be-identified information of the first object is consistent with the set first identification information or not;
the anti-hijack information judgment module is used for judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged;
and the alarm information sending module is used for sending the anti-hijack alarm information to the second object if the anti-hijack information judging module judges that at least one of the first strip, the second strip and the third strip is yes.
9. The anti-hijack alarm system based on information identification as claimed in claim 8, wherein: the device also comprises an identification information storage module which is used for storing the set value N, the set time T, the set first identification information and the first abnormal identification information of the first object.
10. The anti-hijack alarm system based on information identification as claimed in claim 8, wherein: and if the comparison result of the identification information comparison module does not pass, the identification information comparison module sends information that the comparison does not pass to a second object through an alarm information sending module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010321609.4A CN111540177A (en) | 2020-04-22 | 2020-04-22 | Anti-hijack alarm method and system based on information identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010321609.4A CN111540177A (en) | 2020-04-22 | 2020-04-22 | Anti-hijack alarm method and system based on information identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111540177A true CN111540177A (en) | 2020-08-14 |
Family
ID=71979459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010321609.4A Pending CN111540177A (en) | 2020-04-22 | 2020-04-22 | Anti-hijack alarm method and system based on information identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111540177A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112288929A (en) * | 2020-11-06 | 2021-01-29 | 熵基科技股份有限公司 | Entrance guard duress alarm control method and device, terminal and entrance guard security system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6583713B1 (en) * | 1997-08-14 | 2003-06-24 | Micron Technology, Inc. | Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system |
CN104268963A (en) * | 2014-08-06 | 2015-01-07 | 成都百威讯科技有限责任公司 | Intelligent door lock system, intelligent door lock and intelligent alarm door |
CN107392112A (en) * | 2017-06-28 | 2017-11-24 | 中山职业技术学院 | A kind of facial expression recognizing method and its intelligent lock system of application |
CN107992739A (en) * | 2017-11-30 | 2018-05-04 | 北京旷视科技有限公司 | User authentication method, apparatus and system |
CN108664784A (en) * | 2017-04-01 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Alarm method, apparatus and system |
CN109326025A (en) * | 2018-09-07 | 2019-02-12 | 青岛海信智慧家居系统股份有限公司 | The method for unlocking and device of intelligent door lock |
CN110121715A (en) * | 2019-02-19 | 2019-08-13 | 深圳市汇顶科技股份有限公司 | Calling method, device, electronic equipment and storage medium based on Expression Recognition |
-
2020
- 2020-04-22 CN CN202010321609.4A patent/CN111540177A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6583713B1 (en) * | 1997-08-14 | 2003-06-24 | Micron Technology, Inc. | Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system |
CN104268963A (en) * | 2014-08-06 | 2015-01-07 | 成都百威讯科技有限责任公司 | Intelligent door lock system, intelligent door lock and intelligent alarm door |
CN108664784A (en) * | 2017-04-01 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Alarm method, apparatus and system |
CN107392112A (en) * | 2017-06-28 | 2017-11-24 | 中山职业技术学院 | A kind of facial expression recognizing method and its intelligent lock system of application |
CN107992739A (en) * | 2017-11-30 | 2018-05-04 | 北京旷视科技有限公司 | User authentication method, apparatus and system |
CN109326025A (en) * | 2018-09-07 | 2019-02-12 | 青岛海信智慧家居系统股份有限公司 | The method for unlocking and device of intelligent door lock |
CN110121715A (en) * | 2019-02-19 | 2019-08-13 | 深圳市汇顶科技股份有限公司 | Calling method, device, electronic equipment and storage medium based on Expression Recognition |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112288929A (en) * | 2020-11-06 | 2021-01-29 | 熵基科技股份有限公司 | Entrance guard duress alarm control method and device, terminal and entrance guard security system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108600202B (en) | Information processing method and device and computer readable storage medium | |
CA2880597C (en) | System and method of alerting central monitoring station and registered users about a potential duress situation using a mobile application | |
CN108492404B (en) | Face lock unlocking method and device with additional expression recognition function | |
CN111063162A (en) | Silent alarm method and device, computer equipment and storage medium | |
CN111691764B (en) | Household intelligent door lock and control method thereof | |
US6989737B2 (en) | Vehicle antitheft device | |
CN116457851B (en) | System and method for real estate monitoring | |
CN108664784A (en) | Alarm method, apparatus and system | |
CN110493474A (en) | A kind of data processing method, device and electronic equipment | |
CN104580685A (en) | Terminal state processing method and device | |
US20060215035A1 (en) | Fast capture and transmission of information in a portable device | |
CN205080681U (en) | Register one's residence door electronic monitoring device | |
CN111243142A (en) | Failure processing method and device for intelligent door lock and storage medium | |
CN106952445A (en) | A kind of anti-abduction alarm method of domestic intelligent cloud lock and its system | |
US20190392692A1 (en) | Electronic fingerprint device for identifying perpetrators and witnesses of a crime and method thereof | |
CN111340665A (en) | Help seeking method, help seeking terminal and computer readable storage medium | |
CN210428772U (en) | Home security system serving solitary people | |
CN111540177A (en) | Anti-hijack alarm method and system based on information identification | |
CN110853192A (en) | Unlocking and locking control method of safe intelligent lock | |
CN206805757U (en) | Mobile terminal alarm device | |
CN108573584A (en) | Intelligent sound and monitoring system and method based on intelligent sound | |
KR101437406B1 (en) | an emergency management and crime prevention system for cars and the method thereof | |
CN109584490A (en) | Safety protection method, intelligent sound box and security system | |
CN106603814A (en) | Operation method and device for false shutdown of mobile terminal | |
US20210209930A1 (en) | Smart home security system and method of disarming a security setting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200814 |