CN111951507A - Intelligent security comprehensive control system based on building automation - Google Patents

Intelligent security comprehensive control system based on building automation Download PDF

Info

Publication number
CN111951507A
CN111951507A CN202010719225.8A CN202010719225A CN111951507A CN 111951507 A CN111951507 A CN 111951507A CN 202010719225 A CN202010719225 A CN 202010719225A CN 111951507 A CN111951507 A CN 111951507A
Authority
CN
China
Prior art keywords
video
user
security
mobile phone
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010719225.8A
Other languages
Chinese (zh)
Inventor
沈栋梁
金强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunshan Andan Network Technology Co ltd
Original Assignee
Kunshan Andan Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunshan Andan Network Technology Co ltd filed Critical Kunshan Andan Network Technology Co ltd
Priority to CN202010719225.8A priority Critical patent/CN111951507A/en
Publication of CN111951507A publication Critical patent/CN111951507A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19684Portable terminal, e.g. mobile phone, used for viewing video remotely

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an intelligent security and protection integrated control system based on building automation, which is used for solving the problems that the existing system can only depend on supervisors to retrieve video after the fact when suspicious personnel are found in a building, and can only manually screen and check the video for passive evidence obtaining work, so that the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss; the system comprises a data acquisition module, a server, a video analysis module, a video distribution module and a security control module; according to the invention, the human body characteristic recognition and the face recognition are carried out on the video shot by the camera, so that the building security is more intelligent, the user value of the user is obtained by acquiring and analyzing the basic information of the user, and the corresponding auditing user is conveniently and reasonably selected to check the suspicious video segment through the user value, so that the workload of security personnel is reduced, and the security processing efficiency is improved.

Description

Intelligent security comprehensive control system based on building automation
Technical Field
The invention relates to the technical field of intelligent security of buildings, in particular to an intelligent security comprehensive control system based on building automation.
Background
With the rapid development of national economy and the continuous improvement of the living standard of people in China, the requirements of people on living environment are increasingly improved, and intelligent buildings become the development trend of future buildings. In order to effectively manage the safety problem, a user invests a large amount of financial resources, material resources and manpower in the aspect of security protection, and an anti-theft facility and a monitoring system are installed at important positions, and although the measures can play a certain precaution role, the phenomenon of 'passive supervision' exists at the same time;
the existing building security exists: the suspicious personnel of discovery inside the building can only rely on supervisory personnel to retrieve the video recording afterwards, and the manual screening is looked over and is carried out passive formula work of collecting evidence, and relevant staff's working strength is great and work efficiency is low, often omits key information easily.
Disclosure of Invention
The invention aims to solve the problems that in the prior art, suspicious people are found in a building, only a supervisor can read video after the fact, manual screening and checking are carried out for passive evidence obtaining work, the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss, and provides an intelligent security and protection integrated control system based on building automation.
The purpose of the invention can be realized by the following technical scheme: an intelligent security and protection integrated control system based on building automation comprises a data acquisition module, a server, a video analysis module, a video distribution module and a security and protection control module;
the data acquisition module is used for acquiring camera information of a camera in a building and sending the camera information to the server, and the camera information comprises the installation position of the camera. The number of the camera and the video shot by the camera;
the video analysis module is used for acquiring videos shot by the camera and performing video analysis, and the specific analysis steps are as follows:
the method comprises the following steps: carrying out human body feature recognition on the shot video, starting video cutting when the human body feature is recognized, stopping video cutting when the human body feature is not recognized, and marking the cut video as a primary video section;
step two: carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed;
step three: matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building;
step four: the video distribution module sends the video segment to be distributed to the video distribution module;
the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module;
the security control module is used for distributing security personnel to perform security check, and the specific distribution steps are as follows:
s1: acquiring basic information of security personnel, and marking the security personnel as Ri, i is 1, … … and n; calculating the time difference between the time of the security personnel entering the job and the current time of the system to obtain the time of entering the job and marking the time as MRi;
s2: acquiring the real-time position of security personnel, and calculating the distance difference between the real-time position and the position of the camera shot correspondingly to the suspicious video segment to obtain a real-time distance GRi;
s3: setting the age of a security personnel as NRi;
s4: dequantizing the working duration, the real-time interval and the age, and then taking the numerical values;
s5: obtaining a security control value WRi of a security personnel by using a formula WRi of (1/NRi) x c1+ (1/GRi) x c2+ MRi x c 3; wherein c1, c2 and c3 are all preset proportionality coefficients;
s6: selecting the security personnel with the maximum security control value as the selected personnel, and sending the suspicious video segment and the camera position shot by the suspicious video segment correspondingly to the mobile phone terminal of the selected personnel; and after receiving the suspicious video segment and the camera position shot by the corresponding suspicious video segment through the mobile phone terminal, the selected person reaches the camera position shot by the corresponding suspicious video segment, and then inquires and processes the person in the suspicious video segment.
Preferably, the system further comprises a registration login module; the registration login module is used for the security personnel and the users in the building to respectively submit basic information and user information through mobile phone terminals for registration and send the basic information and the user information which are successfully registered to the server for storage, wherein the basic information comprises the name, age, time of entry and mobile phone numbers of the security personnel; the user information comprises house numbers, names, check-in time, mobile phone numbers, mobile phone models and mobile phone purchase time of users in the building.
Preferably, the system further comprises a user analysis module, the user analysis module is configured to obtain user information of a user and perform analysis, and the specific analysis steps are as follows:
SS 1: marking the user as Ek, k is 1, … …, n; calculating the time difference between the check-in time of the user and the current time of the system to obtain the check-in duration of the user and marking the check-in duration as T1 Ek;
SS 2: setting all mobile phone models to a preset value; matching the mobile phone model of the user with all mobile phone models to obtain a corresponding preset value, and marking the preset value as YEk;
SS 3: calculating the time difference between the mobile phone purchasing time and the current system time to obtain purchasing duration T2 Ek;
SS 4: extracting numerical values of the job time, the preset value and the purchase time;
SS 5: obtaining a user value JEk of the user by using a formula JEk ═ T1Ek × c4+ YEk × c5+1/T2Ek × c 6; wherein c4, c5 and c6 are all preset proportionality coefficients;
SS 6: and the user analysis module sends the user value to the server for storage.
Preferably, the specific steps of the video distribution module distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users are as follows:
the method comprises the following steps: acquiring a user value of a user, and marking the user with the user value larger than a set threshold value as a primary selection user;
step two: acquiring the total number of audits of the primary selection user and marking the audits as FA; marking the user value of the primary user as JA;
step three: obtaining an audit value F of the primary user by using a formula F (FA × c7+ JA × c 8); and selecting the initial selection user with the maximum audit value as the audit user.
Compared with the prior art, the invention has the beneficial effects that:
1. the video analysis module acquires videos shot by the cameras and performs video analysis to obtain suspicious video segments, and the video distribution module sends the suspicious video segments and the positions of the corresponding shot cameras to the security control module; the human body feature recognition and the face recognition are carried out on the video shot by the camera, so that the building security is more intelligent, suspicious personnel are prevented from being found in the building, the situation that the video is read by a supervisor after the fact that the suspicious personnel only need to rely on the supervisor to manually screen and check the video for passive evidence obtaining is avoided, the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss;
2. the video distribution module distributes the video segments to be distributed to the mobile phone terminals of corresponding auditing users, obtains the user values of the users by acquiring and analyzing the basic information of the users, and conveniently and reasonably selects the corresponding auditing users to check the suspicious video segments according to the user values, so that the workload of security personnel is reduced, and the security processing efficiency is improved.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an intelligent security and protection integrated control system based on building automation includes a data acquisition module, a server, a video analysis module, a registration and login module, a user analysis module, a video distribution module and a security and protection control module;
the data acquisition module is used for acquiring camera information of a camera in a building and sending the camera information to the server, and the camera information comprises the installation position of the camera. The number of the camera and the video shot by the camera;
the video analysis module is used for acquiring videos shot by the camera and performing video analysis, and the specific analysis steps are as follows:
the method comprises the following steps: carrying out human body feature recognition on the shot video, starting video cutting when the human body feature is recognized, stopping video cutting when the human body feature is not recognized, and marking the cut video as a primary video section;
step two: carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed;
step three: matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building;
step four: the video distribution module sends the video segment to be distributed to the video distribution module;
the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module;
the security control module is used for distributing security personnel to perform security check, and the specific distribution steps are as follows:
s1: acquiring basic information of security personnel, and marking the security personnel as Ri, i is 1, … … and n; calculating the time difference between the time of the security personnel entering the job and the current time of the system to obtain the time of entering the job and marking the time as MRi;
s2: acquiring the real-time position of security personnel, and calculating the distance difference between the real-time position and the position of the camera shot correspondingly to the suspicious video segment to obtain a real-time distance GRi;
s3: setting the age of a security personnel as NRi;
s4: dequantizing the working duration, the real-time interval and the age, and then taking the numerical values;
s5: obtaining a security control value WRi of a security personnel by using a formula WRi of (1/NRi) x c1+ (1/GRi) x c2+ MRi x c 3; wherein c1, c2 and c3 are all preset proportionality coefficients;
s6: selecting the security personnel with the maximum security control value as the selected personnel, and sending the suspicious video segment and the camera position shot by the suspicious video segment correspondingly to the mobile phone terminal of the selected personnel; the method comprises the steps that after receiving a suspicious video segment and a camera position shot by the suspicious video segment through a mobile phone terminal, a selected person arrives at the camera position shot by the suspicious video segment, and then the selected person inquires and processes the person in the suspicious video segment;
the registration login module is used for the security personnel and the users in the building to respectively submit basic information and user information through mobile phone terminals for registration and send the basic information and the user information which are successfully registered to the server for storage, wherein the basic information comprises the name, age, time of entry and mobile phone numbers of the security personnel; the user information comprises house numbers, names, check-in time, mobile phone numbers, mobile phone models and mobile phone purchase time of users in the building;
the user analysis module is used for acquiring and analyzing user information of a user, and the specific analysis steps are as follows:
SS 1: marking the user as Ek, k is 1, … …, n; calculating the time difference between the check-in time of the user and the current time of the system to obtain the check-in duration of the user and marking the check-in duration as T1 Ek;
SS 2: setting all mobile phone models to a preset value; matching the mobile phone model of the user with all mobile phone models to obtain a corresponding preset value, and marking the preset value as YEk;
SS 3: calculating the time difference between the mobile phone purchasing time and the current system time to obtain purchasing duration T2 Ek;
SS 4: extracting numerical values of the job time, the preset value and the purchase time;
SS 5: obtaining a user value JEk of the user by using a formula JEk ═ T1Ek × c4+ YEk × c5+1/T2Ek × c 6; wherein c4, c5 and c6 are all preset proportionality coefficients;
SS 6: and the user analysis module sends the user value to the server for storage.
The specific steps of distributing the video segment to be distributed to the corresponding mobile phone terminal of the auditing user by the video distribution module are as follows:
the method comprises the following steps: acquiring a user value of a user, and marking the user with the user value larger than a set threshold value as a primary selection user;
step two: acquiring the total number of audits of the primary selection user and marking the audits as FA; marking the user value of the primary user as JA;
step three: obtaining an audit value F of the primary user by using a formula F (FA × c7+ JA × c 8); and selecting the initial selection user with the maximum audit value as the audit user.
When the video editing device is used, the video analyzing module is used for acquiring a video shot by the camera and carrying out video analysis, human body feature recognition is carried out on the shot video, when the human body feature is recognized, video cutting is started, when the human body feature is not recognized, the video cutting is stopped, and the cut video is marked as a primary selection video segment; carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed; matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building; the video distribution module sends the video segment to be distributed to the video distribution module; the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module; the human body feature recognition and the face recognition are carried out on the video shot by the camera, so that the building security is more intelligent, suspicious personnel are prevented from being found in the building, the situation that the video is read by a supervisor after the fact that the suspicious personnel only need to rely on the supervisor to manually screen and check the video for passive evidence obtaining is avoided, the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss; the video distribution module distributes the video segments to be distributed to the mobile phone terminals of corresponding auditing users, obtains the user values of the users by acquiring the basic information of the users and analyzing the basic information, and conveniently and reasonably selects the corresponding auditing users to check the suspicious video segments according to the user values, so that the workload of security personnel is reduced, and the security processing efficiency is improved.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (4)

1. An intelligent security and protection integrated control system based on building automation is characterized by comprising a data acquisition module, a server, a video analysis module, a video distribution module and a security and protection control module;
the data acquisition module is used for acquiring camera information of a camera in a building and sending the camera information to the server, and the camera information comprises the installation position of the camera. The number of the camera and the video shot by the camera;
the video analysis module is used for acquiring videos shot by the camera and performing video analysis, and the specific analysis steps are as follows:
the method comprises the following steps: carrying out human body feature recognition on the shot video, starting video cutting when the human body feature is recognized, stopping video cutting when the human body feature is not recognized, and marking the cut video as a primary video section;
step two: carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed;
step three: matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building;
step four: the video distribution module sends the video segment to be distributed to the video distribution module;
the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module;
the security control module is used for distributing security personnel to perform security check, and the specific distribution steps are as follows:
s1: acquiring basic information of security personnel, and marking the security personnel as Ri, i is 1, … … and n; calculating the time difference between the time of the security personnel entering the job and the current time of the system to obtain the time length of entering the job, and marking the time length as MRi
S2: acquiring the real-time position of security personnel and carrying out corresponding shooting of the real-time position and the suspicious video segment on the camera positionObtaining the real-time distance G by calculating the distance differenceRi
S3: setting the age of the security personnel to NRi
S4: dequantizing the working duration, the real-time interval and the age, and then taking the numerical values;
s5: using the formula WRi=(1/NRi)×c1+(1/GRi)×c2+MRiObtaining the security value W of the security personnel by the Xc 3Ri(ii) a Wherein c1, c2 and c3 are all preset proportionality coefficients;
s6: selecting the security personnel with the maximum security control value as the selected personnel, and sending the suspicious video segment and the camera position shot by the suspicious video segment correspondingly to the mobile phone terminal of the selected personnel; and after receiving the suspicious video segment and the camera position shot by the corresponding suspicious video segment through the mobile phone terminal, the selected person reaches the camera position shot by the corresponding suspicious video segment, and then inquires and processes the person in the suspicious video segment.
2. The intelligent security and protection integrated control system based on building automation as claimed in claim 1, wherein the system further comprises a registration login module; the registration login module is used for the security personnel and the users in the building to respectively submit basic information and user information through mobile phone terminals for registration and send the basic information and the user information which are successfully registered to the server for storage, wherein the basic information comprises the name, age, time of entry and mobile phone numbers of the security personnel; the user information comprises house numbers, names, check-in time, mobile phone numbers, mobile phone models and mobile phone purchase time of users in the building.
3. The intelligent security and protection integrated control system based on building automation as claimed in claim 1, wherein the system further comprises a user analysis module, the user analysis module is used for obtaining user information of users and analyzing, the specific analysis steps are as follows:
SS 1: marking the user as Ek, k is 1, … …, n; carrying out time on check-in time of the user and current time of the systemThe difference calculation obtains the user's duration of employment and is labeled as T1Ek
SS 2: setting all mobile phone models to a preset value; matching the mobile phone model of the user with all mobile phone models to obtain a corresponding preset value, and marking the preset value as YEk
SS 3: calculating the time difference between the mobile phone purchasing time and the current system time to obtain purchasing duration T2Ek
SS 4: extracting numerical values of the job time, the preset value and the purchase time;
SS 5: using the formula JEk=T1Ek×c4+YEk×c5+1/T2EkObtaining the user value J of the user by the x c6Ek(ii) a Wherein c4, c5 and c6 are all preset proportionality coefficients;
SS 6: and the user analysis module sends the user value to the server for storage.
4. The intelligent security and protection integrated control system based on building automation as claimed in claim 1, wherein the video distribution module distributes the video segments to be distributed to the mobile phone terminals of the corresponding auditing users by the specific steps of:
the method comprises the following steps: acquiring a user value of a user, and marking the user with the user value larger than a set threshold value as a primary selection user;
step two: acquiring the total number of audits of the primary selection user and marking the audits as FA; marking the user value of the primary user as JA;
step three: obtaining an audit value F of the primary user by using a formula F (FA × c7+ JA × c 8); and selecting the initial selection user with the maximum audit value as the audit user.
CN202010719225.8A 2020-07-23 2020-07-23 Intelligent security comprehensive control system based on building automation Pending CN111951507A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010719225.8A CN111951507A (en) 2020-07-23 2020-07-23 Intelligent security comprehensive control system based on building automation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010719225.8A CN111951507A (en) 2020-07-23 2020-07-23 Intelligent security comprehensive control system based on building automation

Publications (1)

Publication Number Publication Date
CN111951507A true CN111951507A (en) 2020-11-17

Family

ID=73340896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010719225.8A Pending CN111951507A (en) 2020-07-23 2020-07-23 Intelligent security comprehensive control system based on building automation

Country Status (1)

Country Link
CN (1) CN111951507A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112672010A (en) * 2020-12-17 2021-04-16 珍岛信息技术(上海)股份有限公司 Video generation system based on face recognition
CN112837461A (en) * 2020-12-23 2021-05-25 中鸿达信息科技有限公司 Intelligent security comprehensive control system based on building automation
CN115272948A (en) * 2022-05-20 2022-11-01 贵州丰立空间科技有限公司 Intelligent security information system based on Internet of things

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201965714U (en) * 2010-12-29 2011-09-07 羊恺 Home intelligent early-warning security system based on human face recognition
CN205230242U (en) * 2015-12-04 2016-05-11 重庆财信合同能源管理有限公司 Intelligent residential district security protection system
CN107613254A (en) * 2017-09-26 2018-01-19 云丁网络技术(北京)有限公司 It is a kind of to detect visitor, the method and device of identification visitor's identity outdoors
JP6387259B2 (en) * 2014-07-16 2018-09-05 トヨタホーム株式会社 Security system
CN108600700A (en) * 2018-04-25 2018-09-28 北京市电话工程有限公司 A kind of cell video monitoring system
CN109872482A (en) * 2019-01-21 2019-06-11 广东鑫诺安保安服务有限公司 Wisdom security protection monitoring and managing method, system and storage medium
CN110807888A (en) * 2019-09-24 2020-02-18 北京畅景立达软件技术有限公司 Intelligent security method, system and storage medium for park
CN110969560A (en) * 2019-12-26 2020-04-07 安徽唯诗杨信息科技有限公司 Security monitoring management platform based on big data
CN210666913U (en) * 2019-08-09 2020-06-02 沈阳仁德科技有限公司 Intelligent visitor system for access

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201965714U (en) * 2010-12-29 2011-09-07 羊恺 Home intelligent early-warning security system based on human face recognition
JP6387259B2 (en) * 2014-07-16 2018-09-05 トヨタホーム株式会社 Security system
CN205230242U (en) * 2015-12-04 2016-05-11 重庆财信合同能源管理有限公司 Intelligent residential district security protection system
CN107613254A (en) * 2017-09-26 2018-01-19 云丁网络技术(北京)有限公司 It is a kind of to detect visitor, the method and device of identification visitor's identity outdoors
CN108600700A (en) * 2018-04-25 2018-09-28 北京市电话工程有限公司 A kind of cell video monitoring system
CN109872482A (en) * 2019-01-21 2019-06-11 广东鑫诺安保安服务有限公司 Wisdom security protection monitoring and managing method, system and storage medium
CN210666913U (en) * 2019-08-09 2020-06-02 沈阳仁德科技有限公司 Intelligent visitor system for access
CN110807888A (en) * 2019-09-24 2020-02-18 北京畅景立达软件技术有限公司 Intelligent security method, system and storage medium for park
CN110969560A (en) * 2019-12-26 2020-04-07 安徽唯诗杨信息科技有限公司 Security monitoring management platform based on big data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112672010A (en) * 2020-12-17 2021-04-16 珍岛信息技术(上海)股份有限公司 Video generation system based on face recognition
CN112837461A (en) * 2020-12-23 2021-05-25 中鸿达信息科技有限公司 Intelligent security comprehensive control system based on building automation
CN115272948A (en) * 2022-05-20 2022-11-01 贵州丰立空间科技有限公司 Intelligent security information system based on Internet of things
CN115272948B (en) * 2022-05-20 2023-02-17 贵州丰立空间科技有限公司 Intelligent security information system based on Internet of things

Similar Documents

Publication Publication Date Title
CN111951507A (en) Intelligent security comprehensive control system based on building automation
CN106022649B (en) Project supervision, cost, bid, the total management system of consulting
CN207690169U (en) It can reservation type recognition of face gate inhibition's guest system
CN107862773A (en) Can reservation type recognition of face gate inhibition guest system and method
CN110795989A (en) Intelligent safety monitoring system for electric power operation and monitoring method thereof
CN107369222A (en) Engineering staff's work attendance intelligent management and system based on GPS
CN106779380A (en) A kind of intelligent construction safety checks evaluation system and method
CN211509189U (en) Electric power operation field supervision equipment and system
CN110705482A (en) Personnel behavior alarm prompt system based on video AI intelligent analysis
CN109858892A (en) A kind of Aptitude Operation Order Sheet System
CN206179048U (en) Personal identification device
CN207249727U (en) A kind of site safety management system
CN111581417A (en) Identity recognition method, terminal, system and storage medium for power distribution room constructors
CN107239868A (en) End message processing method and processing device for security cruising inspection system
CN110888527A (en) Remote support and field management and control system based on Internet of things technology
CN110543866A (en) Safety management system and method for capital construction engineering constructors
CN105931338A (en) Intelligent community management system based on face recognition
CN111063144A (en) Abnormal behavior monitoring method, device, equipment and computer readable storage medium
CN110942580A (en) Intelligent building visitor management method and system and storage medium
CN105976469A (en) Intelligent doorkeeper management system with robot and application thereof
CN112614260A (en) Intelligent security system based on face recognition and positioning
CN111784901A (en) Cloud access control system based on cloud computing and mobile internet and implementation method
CN110599368A (en) DBM intelligent building management tool
CN114420302A (en) Intelligent epidemic prevention control system for enterprises and public institutions
CN107610261A (en) The system of management of withdrawing from the arena is entered in a kind of building site that can carry out

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 215300 room 404, building a11, No. 18, Jinxing Road, Huaqiao Town, Kunshan City, Suzhou City, Jiangsu Province

Applicant after: Anden wisdom construction Kunshan Co.,Ltd.

Address before: 215300 3rd floor, 185 xinwudong street, Zhangpu Town, Kunshan City, Suzhou City, Jiangsu Province

Applicant before: Kunshan andan Network Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117

RJ01 Rejection of invention patent application after publication