CN111815887A - Security warning system - Google Patents
Security warning system Download PDFInfo
- Publication number
- CN111815887A CN111815887A CN202010687756.3A CN202010687756A CN111815887A CN 111815887 A CN111815887 A CN 111815887A CN 202010687756 A CN202010687756 A CN 202010687756A CN 111815887 A CN111815887 A CN 111815887A
- Authority
- CN
- China
- Prior art keywords
- person
- authenticated
- warning
- security
- monitoring platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a security warning system, which comprises: identity recognition device, sensor device, monitor platform, wherein: the identity recognition device is used for recognizing a person to be authenticated entering a preset area, and if the person to be authenticated is recognized to belong to an authenticated person, the entrance guard is opened; the sensor device sends warning information to the monitoring platform if detecting that an inlet in a security area is abnormal; and the monitoring platform sends warning information to the communication terminals within the preset range after receiving the warning information. By adopting the technical scheme, when the existence of an invader is monitored, nearby personnel are informed in time, effective measures can be taken for invasion in effective time, and meanwhile, the invasion warning device plays a role in frightening and warning the invader; the identity recognition device has an identity recognition function, and safety problems can not occur under the condition that general unlocking tools such as an access control card and a door key are lost.
Description
Technical Field
The invention relates to the field of safety protection, in particular to a security warning system.
Background
In order to cope with the continuously upgraded theft means and the means of invading private houses, people develop various anti-theft devices and anti-theft systems.
When an intruder is detected to exist, the anti-theft safety system adopted in the prior art can timely send out warning and transmit the warning to an owner or other emergency contacts, but other subsequent processing schemes are lacked, and under the condition that the owner does not timely check the warning or cannot timely stop the intruder, the intrusion behavior of the intruder is difficult to stop; the lack of identity recognition scheme, under the condition that entrance guard's card, door key lose, there is the security problem.
Disclosure of Invention
The purpose of the invention is as follows: the invention aims to provide a security warning system which is used for solving the problems in the prior art.
The technical scheme is as follows: the invention provides a security warning system, comprising: identity recognition device, sensor device, monitor platform, wherein:
the identity recognition device is used for recognizing a person to be authenticated entering a preset area, and if the person to be authenticated is recognized to belong to an authenticated person, the entrance guard is opened; if the person to be authenticated is identified not to belong to the authentication person, warning information is sent to the monitoring platform;
the sensor device sends warning information to the monitoring platform if detecting that an inlet in a security area is abnormal;
and the monitoring platform sends warning information to the communication terminals within the preset range after receiving the warning information.
Specifically, the identity recognition device is configured to recognize the person to be authenticated by using at least one of the following modes: iris scan, fingerprint scan, facial recognition.
Specifically, the identity recognition device is used for unlocking the key bin if the person to be authenticated is identified to belong to the authentication person.
Specifically, the identity recognition device is configured to start a warning voice or/and sound-light warning if it is recognized that the person to be authenticated does not belong to the authenticated person, and send the acquired image sound information of the person to be authenticated to the monitoring platform; and the monitoring platform is used for transmitting the received image sound information to the control terminal, and stopping warning if receiving the confirmed misinformation information fed back by the control terminal.
Specifically, the sensor device is used for starting warning voice or/and sound and light warning if detecting that an inlet in a security area is abnormal, and sending the collected image sound information of the person to be authenticated to the monitoring platform.
Specifically, if the monitoring platform receives the confirmation warning information fed back by the control terminal or does not receive the feedback of the control terminal within the preset time, the monitoring platform sends warning information to the communication terminal within the preset range and sends warning information to the security mechanism; the warning information comprises image sound information of the person to be authenticated or/and the geographic position of the security area.
Specifically, the monitoring platform is used for acquiring image and sound information of the person to be authenticated in real time and transmitting the image and sound information to the control terminal or/and the security mechanism in real time.
Specifically, the monitoring platform is used for establishing voice communication connection with the identity recognition device or/and the sensor device; or establishing voice communication connection between the identity recognition device or/and the sensor device and a preset terminal; the preset terminal comprises at least one of the following components: specific communication terminal, security mechanism, control terminal in the predetermined scope.
Has the advantages that: compared with the prior art, the invention has the following remarkable advantages: when the existence of an invader is monitored, nearby personnel are informed in time, effective measures can be taken for invasion in effective time, and meanwhile, the invasion warning device plays roles in deterring and warning the invader; the door unlocking device has an identity recognition function, and safety problems can not occur under the condition that general unlocking tools such as an access control card and a door key are lost.
Drawings
Fig. 1 is a schematic structural diagram of a security warning system provided by the present invention.
Detailed Description
The technical scheme of the invention is further explained by combining the attached drawings.
Fig. 1 is a schematic structural diagram of a security warning system according to the present invention.
The invention provides a security warning system, comprising: identity recognition device, sensor device, monitor platform, wherein:
the identity recognition device is used for recognizing a person to be authenticated entering a preset area, and if the person to be authenticated is recognized to belong to an authenticated person, the entrance guard is opened; if the person to be authenticated is identified not to belong to the authentication person, warning information is sent to the monitoring platform;
the sensor device sends warning information to the monitoring platform if detecting that an inlet in a security area is abnormal;
and the monitoring platform sends warning information to the communication terminals within the preset range after receiving the warning information.
In specific implementation, the identification device can be generally arranged at the entrance of a home (security area), a door, a window and the like.
In specific implementation, the predetermined area may be set by the user according to an actual application scenario, and the authentication personnel may be stored in the identity recognition device by the user in advance. When the identity recognition device recognizes that the person to be authenticated entering the predetermined area does not belong to the authenticated person list, warning information can be sent to the monitoring platform. The identity recognition device has the identity recognition function, and the safety problem can not occur under the condition that the universal unlocking tools such as the access control card, the door key and the like are lost
In specific implementation, if it is detected that an abnormality exists in an entrance (door, window) in the security area, for example, the door, window are partially stressed too much, especially the lock is under too much stress, even being broken or pried, or the identification device is being detached, a warning message may be sent to the monitoring platform.
In specific implementation, if the user enters the room by breaking a home entrance (for example, the home entrance is detected to be abnormal), the indoor sensor device adopting infrared sensing can be started as indoor alarm equipment, whether an intruder enters the room can be monitored by infrared sensing, if the intruder enters the room, the infrared sensor device sends warning information to a monitoring platform, wherein the infrared area of the indoor area monitors the intruder, so that the area through which the intruder passes can be determined, and meanwhile, the indoor audio and video acquisition equipment acquires image and sound information and transmits the image and sound information to the monitoring platform. In specific implementation, after receiving the warning information, the monitoring platform sends warning information to the communication terminals within a predetermined range. The geographical location of the home may be used as a central point, and the warning information may be transmitted to the communication terminal whose distance from the central point is within a predetermined distance range. Generally, the communication terminal can be a smart phone, a computer, a smart bracelet, a smart watch and the like, and can also be an emergency island arranged in a public area, and the monitoring platform can send warning information under the condition that the communication terminal is pre-installed with specific software or provides a specific communication interface for the monitoring platform. When an intrusion behavior occurs, the monitoring platform can timely inform nearby people around the intrusion behavior generating place to take corresponding security measures in time, for example, the people go to the intrusion behavior generating place to stop the intrusion behavior, the emergency island reminds surrounding people of the intrusion behavior by displaying alarm information including picture and sound information of the people to be authenticated or/and geographic positions of security areas and sound and light alarms (so that the situation that the best security opportunity is lost due to the overlong time for a rescue organization to go to the intrusion behavior generating place is avoided). Meanwhile, the anti-theft alarm also plays a role in frightening and warning intruders.
In the embodiment of the present invention, the identity recognition apparatus is configured to recognize a person to be authenticated by using at least one of the following manners: iris scan, fingerprint scan, facial recognition.
In the embodiment of the invention, the identity recognition device is used for opening the key bin if the person to be authenticated is identified to belong to the authenticated person.
In specific implementation, the identity recognition device recognizes that the person to be authenticated belongs to the authentication person, and the door can be opened directly.
In the embodiment of the invention, the identity recognition device is used for starting warning voice or/and sound-light warning and sending the acquired image sound information of the person to be authenticated to the monitoring platform if the person to be authenticated is not identified to belong to the authenticated person; and the monitoring platform is used for transmitting the received image sound information to the control terminal, and stopping warning if receiving the confirmed misinformation information fed back by the control terminal.
In the embodiment of the invention, the sensor device is used for starting warning voice or/and sound and light warning and sending the acquired image and sound information of the person to be authenticated to the monitoring platform if detecting that an inlet in the security area is abnormal.
In the specific implementation, the voice warning or/and the acousto-optic warning is started to frighten an intruder, and meanwhile, the attention of surrounding personnel (neighbors and security guards) can be attracted to stop the intrusion behavior. And the picture and sound information of the person to be authenticated, which does not belong to the authentication person, is sent to the monitoring platform for recording, so that the evidence can be kept, and the person can be conveniently pursued subsequently.
In specific implementation, the control terminal is usually controlled by a proprietor or other specific personnel (emergency contacts), the monitoring platform transfers received image and sound information (without audio acquisition or audio acquisition damage, or without video acquisition or video acquisition damage, only images or only sounds) to the control terminal after receiving the warning information, the proprietor or other specific personnel can confirm whether the personnel to be authenticated has malicious or intrusive behaviors and the like through the image and sound information, if the personnel to be authenticated does not have the intrusive behaviors and the like, the control terminal can send confirmation false alarm information to the monitoring platform, if the confirmation false alarm information fed back by the control terminal is received, the warning is terminated, and unnecessary negative effects are avoided when the personnel to be authenticated does not belong to the intruder.
In the embodiment of the invention, if the monitoring platform receives the confirmation warning information fed back by the control terminal or does not receive the feedback of the control terminal within the preset time, the monitoring platform sends warning information to the communication terminal within the preset range and sends warning information to security mechanisms (security mechanisms and other units with safety guarantee responsibilities); the warning information comprises image sound information of the person to be authenticated or/and the geographic position of the security area.
In specific implementation, after looking up image sound information, an owner or other specific personnel can confirm the existence of an intruder or confirm false alarm, if the existence of intrusion is confirmed, the owner or other specific personnel continue to execute an alarm program, start to send alarm information and the like to a communication terminal in a preset range and send the alarm information to a security mechanism; if false alarm is confirmed, the execution of the warning information is stopped, the warning information is not sent to the communication terminal in the preset range, and the like, so that unnecessary negative effects are avoided, and various bases are adopted to judge whether intrusion behaviors occur or not, and the false alarm rate is reduced.
In specific implementation, if the control terminal does not feed back the warning information, and the control terminal does not receive the feedback of the control terminal within the preset time due to higher security priority, the control terminal continues to execute the warning program and starts to send the warning information and the like to the communication terminal within the preset range, so that the problem that timely action cannot be taken when the user does not check the warning information in time is avoided.
In specific implementation, according to the geographical position of a house, a holder of a security mechanism and a communication terminal within a preset range can go to the house to stop intrusion behaviors, and the person can be prevented from escaping according to the pattern sound information of the person to be authenticated.
In the embodiment of the invention, the monitoring platform is used for acquiring the image and sound information of the person to be authenticated in real time and transmitting the image and sound information to the control terminal or/and the security mechanism in real time.
In the embodiment of the invention, the monitoring platform is used for establishing voice communication connection with the identity recognition device or/and the sensor device; or establishing voice communication connection between the identity recognition device or/and the sensor device and a preset terminal; the preset terminal comprises at least one of the following components: specific communication terminal, security mechanism, control terminal in the predetermined scope.
In specific implementation, voice communication connection can be achieved through voice communication between the owner or security and protection organization personnel and an invader, behavior of the invader is stopped in time, the security and protection organization personnel and the owner can also conduct voice communication, and a plan for stopping the invasion behavior is made together. Meanwhile, the monitoring platform can also directly establish voice communication connection with either or both of the identity recognition device and the sensor device, and a team of the monitoring platform can talk about intruders to stop intrusion behaviors. The specific communication terminal within the predetermined range generally refers to a communication terminal whose distance from the center point is within a predetermined distance range with the geographical position of the home as the center point, and the communication terminal replies to a check to confirm the intrusion behavior toward the home.
Claims (8)
1. A security alarm system, comprising: identity recognition device, sensor device, monitor platform, wherein:
the identity recognition device is used for recognizing a person to be authenticated entering a preset area, and if the person to be authenticated is recognized to belong to an authenticated person, the entrance guard is opened; if the person to be authenticated is identified not to belong to the authentication person, warning information is sent to the monitoring platform;
the sensor device sends warning information to the monitoring platform if detecting that an inlet in a security area is abnormal;
and the monitoring platform sends warning information to the communication terminals within the preset range after receiving the warning information.
2. The security alarm system of claim 1, wherein the identification device is configured to identify the person to be authenticated by using at least one of the following methods: iris scan, fingerprint scan, facial recognition.
3. The security warning system of claim 1, wherein the identity recognition device is configured to unlock a key bin if the person to be authenticated is identified as belonging to an authenticated person.
4. The security warning system of claim 1, wherein the identity recognition device is configured to start a warning voice or/and sound-light warning if it is recognized that the person to be authenticated does not belong to the authenticated person, and send the collected image sound information of the person to be authenticated to the monitoring platform; and the monitoring platform is used for transmitting the received image sound information to the control terminal, and stopping warning if receiving the confirmed misinformation information fed back by the control terminal.
5. The security warning system of claim 4, wherein the sensor device is configured to start a warning voice or/and a sound-light warning if it is detected that an inlet in the security area is abnormal, and send the collected image sound information of the person to be authenticated to the monitoring platform.
6. The security alarm system of claim 5, wherein if the monitoring platform receives the confirmation alarm information fed back by the control terminal or does not receive the feedback of the control terminal within a predetermined time, the monitoring platform sends alarm information to the communication terminal within a predetermined range and sends alarm information to the security mechanism; the warning information comprises image sound information of the person to be authenticated or/and the geographic position of the security area.
7. The security warning system of claim 6, wherein the monitoring platform is configured to obtain image and sound information of the person to be authenticated in real time, and transmit the image and sound information to the control terminal or/and the security mechanism in real time.
8. The security alarm system of claim 6, wherein the monitoring platform is configured to establish a voice communication connection with the identity recognition device or/and the sensor device; or establishing voice communication connection between the identity recognition device or/and the sensor device and a preset terminal; the preset terminal comprises at least one of the following components: specific communication terminal, security mechanism, control terminal in the predetermined scope.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010687756.3A CN111815887A (en) | 2020-07-16 | 2020-07-16 | Security warning system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010687756.3A CN111815887A (en) | 2020-07-16 | 2020-07-16 | Security warning system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111815887A true CN111815887A (en) | 2020-10-23 |
Family
ID=72865644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010687756.3A Pending CN111815887A (en) | 2020-07-16 | 2020-07-16 | Security warning system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111815887A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113205668A (en) * | 2021-03-24 | 2021-08-03 | 深圳震有科技股份有限公司 | Alarm processing method and device based on base station positioning, computer equipment and medium |
CN113815563A (en) * | 2021-09-15 | 2021-12-21 | 深圳市保国特卫安保技术服务有限公司 | Vehicle anti-damage method, device, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106205022A (en) * | 2016-09-18 | 2016-12-07 | 瞿洪桂 | A kind of security system for home security and method |
CN107860097A (en) * | 2017-09-20 | 2018-03-30 | 珠海格力电器股份有限公司 | Security monitoring method and device and air conditioner with device |
WO2018232922A1 (en) * | 2017-06-23 | 2018-12-27 | 深圳市盛路物联通讯技术有限公司 | Home security method and system |
CN208506919U (en) * | 2018-06-28 | 2019-02-15 | 江苏尚秦工程技术有限公司 | A kind of intelligent safety and defence system |
CN208506918U (en) * | 2018-06-28 | 2019-02-15 | 江苏尚秦工程技术有限公司 | A kind of intelligent safety and defence system |
CN110390785A (en) * | 2019-07-26 | 2019-10-29 | 美的置业集团有限公司 | A kind of smart home security inter-linked controlling method, device, medium and terminal device |
CN110853276A (en) * | 2019-12-05 | 2020-02-28 | 电子科技大学中山学院 | Intelligent security intrusion detection system |
-
2020
- 2020-07-16 CN CN202010687756.3A patent/CN111815887A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106205022A (en) * | 2016-09-18 | 2016-12-07 | 瞿洪桂 | A kind of security system for home security and method |
WO2018232922A1 (en) * | 2017-06-23 | 2018-12-27 | 深圳市盛路物联通讯技术有限公司 | Home security method and system |
CN107860097A (en) * | 2017-09-20 | 2018-03-30 | 珠海格力电器股份有限公司 | Security monitoring method and device and air conditioner with device |
CN208506919U (en) * | 2018-06-28 | 2019-02-15 | 江苏尚秦工程技术有限公司 | A kind of intelligent safety and defence system |
CN208506918U (en) * | 2018-06-28 | 2019-02-15 | 江苏尚秦工程技术有限公司 | A kind of intelligent safety and defence system |
CN110390785A (en) * | 2019-07-26 | 2019-10-29 | 美的置业集团有限公司 | A kind of smart home security inter-linked controlling method, device, medium and terminal device |
CN110853276A (en) * | 2019-12-05 | 2020-02-28 | 电子科技大学中山学院 | Intelligent security intrusion detection system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113205668A (en) * | 2021-03-24 | 2021-08-03 | 深圳震有科技股份有限公司 | Alarm processing method and device based on base station positioning, computer equipment and medium |
CN113815563A (en) * | 2021-09-15 | 2021-12-21 | 深圳市保国特卫安保技术服务有限公司 | Vehicle anti-damage method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10654448B2 (en) | Vehicle security system | |
CA2630308C (en) | Video alarm verification | |
US9734644B2 (en) | Wireless camera facilitated building security | |
CN116457851B (en) | System and method for real estate monitoring | |
JPH05166090A (en) | Burglar monitoring system | |
CN104967825A (en) | Gatekeeper electronic dog system | |
US10419728B2 (en) | Monitoring system having personal information protection function and method thereof | |
CN112863101B (en) | Power distribution room environment and safety monitoring method and system | |
CN111815887A (en) | Security warning system | |
JP3722087B2 (en) | Monitoring method, monitoring system, monitoring program, and recording medium recording the monitoring program | |
US9847016B2 (en) | System and method of communicating data from an alarm system to emergency services personnel | |
JP2008153852A (en) | Electric power line carrier system and its power supply device, electric lock device, and server | |
KR20200044223A (en) | Security service system using IOT-based smart door lock | |
KR101107011B1 (en) | The remote control type locking apparatus for door having crime prevention function | |
JP2019028580A (en) | Monitoring system | |
WO2017216760A1 (en) | System and method for tracing one or more persons following an alarm event | |
CN111899479A (en) | Accident monitoring system | |
KR20100012156A (en) | An identification of coming and going user, information transfer system based on biometrics | |
JP2011013828A (en) | Security system | |
KR20190143514A (en) | Security robot and security method for manage house with face recognition door lock | |
CN109637061A (en) | A kind of security system and the alarm method for judging illegal burglary | |
CN218585422U (en) | Enterprise safety alarm system | |
CN118658231A (en) | Temporary door opening password in intelligent monitoring system | |
JP2003217011A (en) | Automatic vending machine, notifying device, and notifying method | |
CN210598481U (en) | Electronic lock with remote alarm function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |