CN111540177A - Anti-hijack alarm method and system based on information identification - Google Patents

Anti-hijack alarm method and system based on information identification Download PDF

Info

Publication number
CN111540177A
CN111540177A CN202010321609.4A CN202010321609A CN111540177A CN 111540177 A CN111540177 A CN 111540177A CN 202010321609 A CN202010321609 A CN 202010321609A CN 111540177 A CN111540177 A CN 111540177A
Authority
CN
China
Prior art keywords
information
identification
hijack
identified
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010321609.4A
Other languages
Chinese (zh)
Inventor
张帮林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dessmann China Machinery and Electronic Co Ltd
Original Assignee
Dessmann China Machinery and Electronic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dessmann China Machinery and Electronic Co Ltd filed Critical Dessmann China Machinery and Electronic Co Ltd
Priority to CN202010321609.4A priority Critical patent/CN111540177A/en
Publication of CN111540177A publication Critical patent/CN111540177A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an anti-hijack alarm method and system based on information identification, and belongs to the technical field of information identification. The method comprises the following steps: acquiring first to-be-identified information of a first object; the first to-be-identified information of the first object is consistent with the set first identification information in comparison; then judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object; wherein N is an integer, and N is more than or equal to 2. The technical scheme of the invention is easy to trigger the anti-hijack function, and is convenient for rescuing the hijacked user in time.

Description

Anti-hijack alarm method and system based on information identification
Technical Field
The invention relates to the technical field of information identification, in particular to an anti-hijack alarm method and an anti-hijack alarm system based on information identification.
Background
The intelligent lock industry develops rapidly, and has the requirement of anti-hijack function based on the use scene of a user, the existing anti-hijack technology of the intelligent lock industry adopts a specific password or a specific fingerprint to judge whether the user is hijacked, and the face anti-hijack technology is a blank. At present, with the development of digital technology, electronic locks such as fingerprints, coded locks, card locks and the like are popular in the market, but the anti-hijacking alarm reporting function is blank in the market, and part of electronic door locks with switch output interfaces are also available in the market, so that the locks can send out alarm sirens after errors can be input for many times, but the locks do not have the alarm reporting function. The traditional electronic lock has limitation in alarm mode, only has the alarm function of the alarm bell of the traditional electronic lock, and basically cannot play the actual warning or help seeking role in sound and light alarm under the current social environment. Secondly, the anti-theft technology in modern life adopts the alarm bell to alarm, users have learned about the surrounding alarm sound, and few people pay attention to the alarm bell, so that the alarm bell cannot play the due alarm function. Moreover, police bells and other sounds can be annoying to banderolers.
At present, along with the development of digital technology, electronic locks such as magnetic cards, fingerprints and passwords are popular in the market, but the intelligent lock for hijacking and automatically alarming is blank in the market, and partial electronic door locks with alarming functions are also available in the market. The password input mode of the traditional password lock has limitations, firstly, when a person is hijacked and is forced to open the door, the door can not be opened, the robber can threaten the door, and people around the door can not dare to alarm because of the threatened door; secondly, even if the coded lock is based on an alarm function and also alarms by an alarm bell, users have learned that the alarm sound around the coded lock is normal, few people pay attention to the alarm bell, so that the alarm bell cannot alarm, and the fixed key-type code is easy to steal.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problem, the invention provides an anti-hijack alarm method and an anti-hijack alarm system based on information identification. The anti-hijack function is easy to trigger, and the hijacked user can be rescued in time.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
an anti-hijack alarm method based on information identification comprises the following steps: acquiring first to-be-identified information of a first object; the first to-be-identified information of the first object is consistent with the set first identification information in comparison; then judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object; wherein N is an integer, and N is more than or equal to 2.
Preferably, the first information to be identified is face information; the set first identification information is face information prestored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is face information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring face information of a first object; the face information of the first object is consistent with face information prestored by the first object in comparison; then judging: whether the number of times of acquiring or identifying the face information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the face information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be identified is fingerprint information; the set first identification information is fingerprint information of a first finger pre-stored by a first object; when the first information to be identified is fingerprint information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: collecting fingerprint information of a first object; the fingerprint information of the first object is compared with the fingerprint information of a first finger prestored by the first object; then judging: whether the number of times of first-item, collection or identification of fingerprint information of a first object exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be identified is iris information; the set first identification information is the iris information pre-stored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is iris information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring iris information of a first object; comparing the iris information of the first object with the iris information prestored in the first object to be consistent; then judging: first, whether the number of times of acquiring or identifying the iris information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the iris information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be identified is entrance guard card information; the set first identification information is access control card information pre-stored by the first object; when the first information to be identified is access control card information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring access card information of a first object; the access control card information of the first object is consistent with the access control card information prestored by the first object in comparison; then judging: the method comprises the steps of firstly, acquiring or identifying whether the number of times of access control card information of a first object exceeds a set value N; whether the second and the first object stay time exceeds the set time T; if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be recognized is voice information; the set first identification information is voice information pre-stored by the first object; the first abnormal identification information is anti-hijack voice information of a first object; when the first information to be identified is voice information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: collecting voice information of a first object; the voice information of the first object is compared with the pre-stored voice information of the first object to be consistent; then judging: whether the number of times of acquiring or identifying the voice information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack voice information of the first object exists in the voice information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
Preferably, the first information to be recognized is gesture information; the set first identification information is gesture information pre-stored by a first object; the first abnormal identification information is anti-hijack gesture information of a first object; when the first information to be identified is gesture information, a corresponding anti-hijack alarm method based on information identification comprises the following steps: acquiring gesture information of a first object; the gesture information of the first object is consistent with gesture information prestored by the first object in comparison; then judging: whether the number of times of acquiring or identifying gesture information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack gesture information of the first object exists in the gesture information of the first object or not; if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
An anti-hijack alarm system based on information identification according to the above anti-hijack alarm method based on information identification comprises: the identification information acquisition module is used for acquiring first to-be-identified information of a first object; the identification information comparison module is used for comparing whether the first to-be-identified information of the first object is consistent with the set first identification information or not; the anti-hijack information judgment module is used for judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged; and the alarm information sending module is used for sending the anti-hijack alarm information to the second object if the anti-hijack information judging module judges that at least one of the first strip, the second strip and the third strip is yes.
Preferably, the mobile terminal further comprises an identification information storage module for storing the set value N, the set time T, the set first identification information and the first abnormality identification information of the first object. The first identification information and the first abnormal identification information of the first object are stored in advance; for use at the moment of the hijacked crisis.
Preferably, if the comparison result of the identification information comparison module fails, the identification information comparison module sends information that the comparison fails to pass to the second object through the alarm information sending module.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
the embodiment of the application provides an anti-hijack alarm method and system based on information identification, which can trigger an anti-hijack alarm function without the detection of a hijack person and is convenient for rescuing the hijacked user in time.
Drawings
Fig. 1 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 1 of the present invention;
fig. 2 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 2 of the present invention;
fig. 3 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 3 of the present invention;
fig. 4 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 4 of the present invention;
fig. 5 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 5 of the present invention;
fig. 6 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 6 of the present invention;
fig. 7 is a flowchart of an anti-hijack alarm method based on information identification according to embodiment 7 of the present invention;
fig. 8 is a schematic structural diagram of an anti-hijack alarm system based on information identification according to embodiment 8 of the present invention;
fig. 9 is a schematic structural diagram of an anti-hijack alarm system based on information identification according to embodiment 9 of the present invention;
fig. 10 is a flowchart of an anti-hijack alarm method based on information identification according to a preferred embodiment of the present invention 8;
fig. 11 is a schematic structural diagram of an anti-hijack alarm system based on information identification according to an embodiment 8 of the present invention.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 1, including:
s101, collecting first to-be-identified information of a first object;
s102, comparing the first to-be-identified information of the first object with set first identification information;
then judging: s103, whether the frequency of collecting or identifying the first information to be identified exceeds a set value N or not is judged; s104, whether the first object staying time exceeds the set time T or not; s105, whether first abnormal identification information of the set first object exists in the first to-be-identified information of the first object or not;
if at least one of S103-S105 is yes, S106, sending anti-hijack alarm information to a second object; wherein N is an integer, and N is more than or equal to 2; in specific application, N can be numbers such as 2, 3, 4, 5, 6, 7 and the like; t can be ms or s, such as 30ms, 1s, etc.
The anti-hijack alarm method based on information identification can be applied to occasions or fields where hardware such as intelligent locks, coded locks and the like are located, the first information to be identified can be biological characteristic information of a human body, such as human faces, fingerprints, irises and the like, and can also be cards utilizing a near field communication technology. The set first identification information is real first identification information which is preset and stored in an identification module of the hardware to be started. And when one of the first, second and third persons is yes, judging that the first object is hijacked, and sending alarm information to the second object. Wherein, the second object can be family, friend, or emergency contact of the first object; the judgment conditions of the first strip, the second strip and the third strip can be realized in emergency without the awareness of a hijacker. N can take values of 2, 3, 4 and the like, but the value of N is not too large, so that the condition that the hijacker waits too long and is irritated to generate adverse results is avoided. The value of the set time T is slightly larger than the time spent on one-time identification and passing at ordinary times, for example, the time spent on identifying and passing at most 2 seconds at ordinary times, and then the set time T can be set to be longer than 2 seconds so as to send out alarm information under the condition that a gangster cannot detect the alarm information. Setting first abnormal identification information of a first object, for example, eye closing action during iris identification, for example, eye closing action during face identification, or left-right shaking action and the like, which are different from ordinary unlocking actions; if the door of the access control card is opened, the staying time of the access control card at the identification module is slightly longer than the passing time of the identification at ordinary times.
In S106, the method of sending the anti-hijack alarm information to the second object may be sending a short message, sending a WeChat, automatically making a call, and the like to prompt the second object. The actual use frequency and use habit of the relevant handheld mobile equipment such as a mobile phone and the like can be set according to the second object. The content of the anti-hijack alarm information includes but is not limited to: identity information such as a name and a face image of the first object, position information of the first object, and the like; may also be based on the first object.
Example 2
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 2, on the basis of embodiment 1, the following improvements can be made: the first information to be identified is face information; the set first identification information is face information prestored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is face information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s201, collecting face information of a first object; s202, comparing the face information of the first object with face information prestored in the first object to be consistent;
then judging: s203, whether the frequency of acquiring or identifying the face information of the first object exceeds a set value N or not is judged; s204, whether the first object staying time exceeds the set time T or not; s205, whether the set blink action information of the first object exists in the face information of the first object or not;
and if at least one of S203-S205 is yes, S206, sending anti-hijack alarm information to the second object.
Example 3
The embodiment proposes an anti-hijack alarm method based on information identification, as shown in fig. 3, on the basis of the embodiment 1 or 2, the following improvements can be made: the first information to be identified is fingerprint information; the set first identification information is fingerprint information of a first finger pre-stored by a first object; when the first information to be identified is fingerprint information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s301, collecting fingerprint information of a first object;
s302, comparing the fingerprint information of the first object with the fingerprint information of a first finger pre-stored in the first object to be consistent;
then judging: s303, whether the number of times of collecting or identifying the fingerprint information of the first object exceeds a set value N or not is judged; s304, whether the first object staying time exceeds the set time T or not;
and if at least one of S303 and S304 is yes, S305, sending anti-hijack alarm information to the second object.
Example 4
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 4, on the basis of any one of the technical solutions of embodiments 1 to 3, the following can be improved: the first information to be identified is iris information; the set first identification information is the iris information pre-stored by the first object; the first abnormal identification information is blink action information of the first object; when the first information to be identified is iris information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s401, collecting iris information of a first object;
s402, comparing the iris information of the first object with the iris information prestored in the first object to be consistent;
then judging: s403, whether the number of times of collecting or identifying the iris information of the first object exceeds a set value N or not is judged; s404, whether the first object staying time exceeds the set time T or not; s405, whether the set blink action information of the first object exists in the iris information of the first object or not;
and if at least one of S403 to S405 is yes, S406, sending anti-hijack alarm information to the second object.
Example 5
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 5, on the basis of any one of the technical solutions of embodiments 1 to 4, the following can be improved: the first information to be identified is entrance guard card information; the set first identification information is access control card information pre-stored by the first object; when the first information to be identified is access control card information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s501, collecting entrance guard card information of a first object;
s502, comparing the access control card information of the first object with the access control card information prestored in the first object to be consistent;
then judging: s503, whether the number of times of acquiring or identifying the access control card information of the first object exceeds a set value N or not is judged; s504, whether the first object staying time exceeds the set time T or not;
and if at least one of S503 and S504 is yes, S505, sending anti-hijack alarm information to the second object.
Example 6
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 6, on the basis of any one of the technical solutions in embodiments 1 to 6, the following can be improved: the first information to be identified is voice information; the set first identification information is voice information pre-stored by the first object; the first abnormal identification information is anti-hijack voice information of a first object; when the first information to be identified is voice information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s601, collecting voice information of a first object;
s602, comparing the voice information of the first object with the pre-stored voice information of the first object to be consistent;
then judging: s603, whether the frequency of collecting or identifying the voice information of the first object exceeds a set value N or not is judged; s604, judging whether the first object staying time exceeds the set time T or not; s605, whether the set anti-hijack voice information of the first object exists in the voice information of the first object or not;
and if at least one of S603 to S605 is yes, S606, sending anti-hijack alarm information to the second object.
Example 7
The embodiment provides an anti-hijack alarm method based on information identification, as shown in fig. 7, on the basis of any one of the technical solutions in embodiments 1 to 6, the following improvements can be made: the first information to be recognized is gesture information; the set first identification information is gesture information pre-stored by a first object; the first abnormal identification information is anti-hijack gesture information of a first object; when the first information to be identified is gesture information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
s701, acquiring gesture information of a first object;
s702, comparing the gesture information of the first object with gesture information prestored in the first object to be consistent;
then judging: s703, acquiring or identifying whether the number of times of the gesture information of the first object exceeds a set value N; s704, whether the first object staying time exceeds the set time T or not; s705, whether set anti-hijack gesture information of the first object exists in the gesture information of the first object or not;
if at least one of S703 to S705 is yes, S706 sends anti-hijack alarm information to the second object.
Example 8
This embodiment proposes an anti-hijack alarm system based on information identification, as shown in fig. 8, which corresponds to the anti-hijack alarm method based on information identification described in any one of embodiments 1 to 7, and includes:
the identification information acquisition module is used for acquiring first to-be-identified information of a first object;
the identification information comparison module (a built-in comparison method, such as a face recognition algorithm) is used for comparing whether the first to-be-identified information of the first object is consistent with the set first identification information;
the anti-hijack information judgment module is used for judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged;
and the alarm information sending module is used for sending the anti-hijack alarm information to the second object if the anti-hijack information judging module judges that at least one of the first strip, the second strip and the third strip is yes.
When the intelligence lock includes a prevent hijack alarm system based on information identification, still include mechanical structure and wireless signal transmission module such as human proximity sensor, button detection module, motor drive module, wireless signal transmission module, power module, lock body, shell handle: a WIFI module, an NB-IoT module narrowband cellular Internet of things, a 2G module and the like.
A corresponding anti-hijack alarm method based on information identification, as shown in fig. 10, includes:
s801, judging whether a person approaches; if yes, S802, an identification information comparison module of a built-in face identification algorithm judges whether the user is the user; if not, S8021, adding 1 to the number of identification errors;
s8022, judging whether the error frequency reaches a preset maximum value; if not, repeating the step S802; if yes, S8023, locking the system for 3 minutes; then steps S801 and S802 are repeated;
if the judgment in the step S802 is yes, S803, judging whether the collected picture has eye closing action in the process of identifying; if not, repeating the step S8021 and the step S8022;
if the judgment in the step S803 is yes, S804, judging whether the eyes of the user are closed for more than 1 second; if not, S805, normally opening the door and uploading a door opening record; if yes, S806, normally opening the door, informing other users of the imperceptible transmission of the hijacked message of the user, and transmitting the hijacked message to the mobile phones of the other users through the wireless module. For example, if the eyes are closed for more than 1 second, the user a is hijacked, the hijacked information of the user a is reported to the server through the wireless module, and the server informs other users in the forms of short messages, APP message reminding and the like, so that the user a is timely rescued.
The anti-hijack alarm method based on information identification can be simplified as shown in fig. 11, and includes:
1. the face recognition module collects original pictures and converts the pictures into target files, namely, whether people approach the intelligent lock is detected by the human body proximity sensor, and if people approach the intelligent lock, the face recognition module executes the following steps:
2. extracting a characteristic value in the target file, namely prompting a user to verify a face by a lockset voice, and closing eye recognition if the user A is hijacked; the face recognition module collects face information, judges whether the user is input through a face recognition algorithm, and executes the following steps if the user is input:
3. comparing the characteristic values through an eye closing detection algorithm, and judging whether an eye closing action exists or not; namely, whether the user A has eye closing action is collected, judged and verified through a face recognition algorithm.
Example 9
The embodiment provides an anti-hijack alarm system based on information identification, as shown in fig. 9, based on the technical solution of embodiment 8, the following can be improved: the device also comprises an identification information storage module which is used for storing the set value N, the set time T, the set first identification information and the first abnormal identification information of the first object. The first identification information and the first abnormal identification information of the first object are stored in advance; for use at the moment of the hijacked crisis.
Example 10
The embodiment provides an anti-hijack alarm system based on information identification, which can be improved on the basis of the technical scheme of the embodiment 8 or 9 as follows: and if the comparison result of the identification information comparison module does not pass, the identification information comparison module sends information that the comparison does not pass to a second object through an alarm information sending module.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. An anti-hijack alarm method based on information identification is characterized by comprising the following steps:
acquiring first to-be-identified information of a first object;
the first to-be-identified information of the first object is consistent with the set first identification information in comparison;
then judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object; wherein N is an integer, and N is more than or equal to 2.
2. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is face information; the set first identification information is face information prestored by the first object; the first abnormal identification information is blink action information of the first object;
when the first information to be identified is face information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring face information of a first object;
the face information of the first object is consistent with face information prestored by the first object in comparison;
then judging: whether the number of times of acquiring or identifying the face information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the face information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
3. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is fingerprint information; the set first identification information is fingerprint information of a first finger pre-stored by a first object; when the first information to be identified is fingerprint information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
collecting fingerprint information of a first object;
the fingerprint information of the first object is compared with the fingerprint information of a first finger prestored by the first object;
then judging: whether the number of times of first-item, collection or identification of fingerprint information of a first object exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T;
if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
4. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is iris information; the set first identification information is the iris information pre-stored by the first object; the first abnormal identification information is blink action information of the first object;
when the first information to be identified is iris information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring iris information of a first object;
comparing the iris information of the first object with the iris information prestored in the first object to be consistent;
then judging: first, whether the number of times of acquiring or identifying the iris information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set blink action information of the first object exists in the iris information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
5. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be identified is entrance guard card information; the set first identification information is access control card information pre-stored by the first object;
when the first information to be identified is access control card information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring access card information of a first object;
the access control card information of the first object is consistent with the access control card information prestored by the first object in comparison;
then judging: the method comprises the steps of firstly, acquiring or identifying whether the number of times of access control card information of a first object exceeds a set value N; whether the second and the first object stay time exceeds the set time T;
if at least one of the first and second items is yes, anti-hijack alarm information is sent to the second object.
6. An anti-hijacking alarm method based on information identification according to any one of claims 1-5, characterized in that: the first information to be identified is voice information; the set first identification information is voice information pre-stored by the first object; the first abnormal identification information is anti-hijack voice information of a first object;
when the first information to be identified is voice information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
collecting voice information of a first object;
the voice information of the first object is compared with the pre-stored voice information of the first object to be consistent;
then judging: whether the number of times of acquiring or identifying the voice information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack voice information of the first object exists in the voice information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
7. The anti-hijack alarm method based on information identification as claimed in claim 1, wherein: the first information to be recognized is gesture information; the set first identification information is gesture information pre-stored by a first object; the first abnormal identification information is anti-hijack gesture information of a first object;
when the first information to be identified is gesture information, a corresponding anti-hijack alarm method based on information identification comprises the following steps:
acquiring gesture information of a first object;
the gesture information of the first object is consistent with gesture information prestored by the first object in comparison;
then judging: whether the number of times of acquiring or identifying gesture information of the first object exceeds a set value N or not is judged; whether the second and the first object stay time exceeds the set time T; thirdly, whether the set anti-hijack gesture information of the first object exists in the gesture information of the first object or not;
if at least one of the first bar, the second bar and the third bar is yes, anti-hijack alarm information is sent to the second object.
8. An anti-hijack alarm system based on information identification is characterized in that: an anti-hijacking alarm method based on information identification according to any one of claims 1-7, comprising:
the identification information acquisition module is used for acquiring first to-be-identified information of a first object;
the identification information comparison module is used for comparing whether the first to-be-identified information of the first object is consistent with the set first identification information or not;
the anti-hijack information judgment module is used for judging: the first item, whether the times of collecting or identifying the first information to be identified exceeds a set value N or not; whether the second and the first object stay time exceeds the set time T; third, whether the first to-be-identified information of the first object has the set first abnormal identification information of the first object or not is judged;
and the alarm information sending module is used for sending the anti-hijack alarm information to the second object if the anti-hijack information judging module judges that at least one of the first strip, the second strip and the third strip is yes.
9. The anti-hijack alarm system based on information identification as claimed in claim 8, wherein: the device also comprises an identification information storage module which is used for storing the set value N, the set time T, the set first identification information and the first abnormal identification information of the first object.
10. The anti-hijack alarm system based on information identification as claimed in claim 8, wherein: and if the comparison result of the identification information comparison module does not pass, the identification information comparison module sends information that the comparison does not pass to a second object through an alarm information sending module.
CN202010321609.4A 2020-04-22 2020-04-22 Anti-hijack alarm method and system based on information identification Pending CN111540177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010321609.4A CN111540177A (en) 2020-04-22 2020-04-22 Anti-hijack alarm method and system based on information identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010321609.4A CN111540177A (en) 2020-04-22 2020-04-22 Anti-hijack alarm method and system based on information identification

Publications (1)

Publication Number Publication Date
CN111540177A true CN111540177A (en) 2020-08-14

Family

ID=71979459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010321609.4A Pending CN111540177A (en) 2020-04-22 2020-04-22 Anti-hijack alarm method and system based on information identification

Country Status (1)

Country Link
CN (1) CN111540177A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112288929A (en) * 2020-11-06 2021-01-29 熵基科技股份有限公司 Entrance guard duress alarm control method and device, terminal and entrance guard security system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6583713B1 (en) * 1997-08-14 2003-06-24 Micron Technology, Inc. Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system
CN104268963A (en) * 2014-08-06 2015-01-07 成都百威讯科技有限责任公司 Intelligent door lock system, intelligent door lock and intelligent alarm door
CN107392112A (en) * 2017-06-28 2017-11-24 中山职业技术学院 A kind of facial expression recognizing method and its intelligent lock system of application
CN107992739A (en) * 2017-11-30 2018-05-04 北京旷视科技有限公司 User authentication method, apparatus and system
CN108664784A (en) * 2017-04-01 2018-10-16 阿里巴巴集团控股有限公司 Alarm method, apparatus and system
CN109326025A (en) * 2018-09-07 2019-02-12 青岛海信智慧家居系统股份有限公司 The method for unlocking and device of intelligent door lock
CN110121715A (en) * 2019-02-19 2019-08-13 深圳市汇顶科技股份有限公司 Calling method, device, electronic equipment and storage medium based on Expression Recognition

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6583713B1 (en) * 1997-08-14 2003-06-24 Micron Technology, Inc. Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system
CN104268963A (en) * 2014-08-06 2015-01-07 成都百威讯科技有限责任公司 Intelligent door lock system, intelligent door lock and intelligent alarm door
CN108664784A (en) * 2017-04-01 2018-10-16 阿里巴巴集团控股有限公司 Alarm method, apparatus and system
CN107392112A (en) * 2017-06-28 2017-11-24 中山职业技术学院 A kind of facial expression recognizing method and its intelligent lock system of application
CN107992739A (en) * 2017-11-30 2018-05-04 北京旷视科技有限公司 User authentication method, apparatus and system
CN109326025A (en) * 2018-09-07 2019-02-12 青岛海信智慧家居系统股份有限公司 The method for unlocking and device of intelligent door lock
CN110121715A (en) * 2019-02-19 2019-08-13 深圳市汇顶科技股份有限公司 Calling method, device, electronic equipment and storage medium based on Expression Recognition

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112288929A (en) * 2020-11-06 2021-01-29 熵基科技股份有限公司 Entrance guard duress alarm control method and device, terminal and entrance guard security system

Similar Documents

Publication Publication Date Title
CN108600202B (en) Information processing method and device and computer readable storage medium
CA2880597C (en) System and method of alerting central monitoring station and registered users about a potential duress situation using a mobile application
CN108492404B (en) Face lock unlocking method and device with additional expression recognition function
CN111063162A (en) Silent alarm method and device, computer equipment and storage medium
CN111691764B (en) Household intelligent door lock and control method thereof
US6989737B2 (en) Vehicle antitheft device
CN116457851B (en) System and method for real estate monitoring
CN108664784A (en) Alarm method, apparatus and system
CN110493474A (en) A kind of data processing method, device and electronic equipment
CN104580685A (en) Terminal state processing method and device
US20060215035A1 (en) Fast capture and transmission of information in a portable device
CN205080681U (en) Register one's residence door electronic monitoring device
CN111243142A (en) Failure processing method and device for intelligent door lock and storage medium
CN106952445A (en) A kind of anti-abduction alarm method of domestic intelligent cloud lock and its system
US20190392692A1 (en) Electronic fingerprint device for identifying perpetrators and witnesses of a crime and method thereof
CN111340665A (en) Help seeking method, help seeking terminal and computer readable storage medium
CN210428772U (en) Home security system serving solitary people
CN111540177A (en) Anti-hijack alarm method and system based on information identification
CN110853192A (en) Unlocking and locking control method of safe intelligent lock
CN206805757U (en) Mobile terminal alarm device
CN108573584A (en) Intelligent sound and monitoring system and method based on intelligent sound
KR101437406B1 (en) an emergency management and crime prevention system for cars and the method thereof
CN109584490A (en) Safety protection method, intelligent sound box and security system
CN106603814A (en) Operation method and device for false shutdown of mobile terminal
US20210209930A1 (en) Smart home security system and method of disarming a security setting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200814