CN111968324A - Big data-based intelligent community security alarm system - Google Patents

Big data-based intelligent community security alarm system Download PDF

Info

Publication number
CN111968324A
CN111968324A CN202010827295.5A CN202010827295A CN111968324A CN 111968324 A CN111968324 A CN 111968324A CN 202010827295 A CN202010827295 A CN 202010827295A CN 111968324 A CN111968324 A CN 111968324A
Authority
CN
China
Prior art keywords
security
correlation
verification
terminal
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010827295.5A
Other languages
Chinese (zh)
Inventor
罗孝琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangyuan Liangzhihui Technology Co ltd
Original Assignee
Guangyuan Liangzhihui Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangyuan Liangzhihui Technology Co ltd filed Critical Guangyuan Liangzhihui Technology Co ltd
Priority to CN202010827295.5A priority Critical patent/CN111968324A/en
Publication of CN111968324A publication Critical patent/CN111968324A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1609Actuation by interference with mechanical vibrations in air or other fluid using active vibration detection systems
    • G08B13/1618Actuation by interference with mechanical vibrations in air or other fluid using active vibration detection systems using ultrasonic detection means
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1609Actuation by interference with mechanical vibrations in air or other fluid using active vibration detection systems
    • G08B13/1645Actuation by interference with mechanical vibrations in air or other fluid using active vibration detection systems using ultrasonic detection means and other detection means, e.g. microwave or infrared radiation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to an intelligent community security alarm system based on big data, which comprises: the intelligent community security management platform comprises an intelligent community security management platform, an intelligent community alarm monitoring system and a security terminal. The intelligent community security management platform is in communication connection with the security terminal and the intelligent community alarm monitoring system respectively; the intelligent community security management platform comprises a plurality of security subsystems, and each security subsystem comprises an electronic fence system, a video monitoring system, an electronic patrol system and a parking management system; the security subsystem comprises a call-back unit, a shuttle patrol detection unit, a first correlation unit and a database, and all the units are in communication connection; wisdom community reports an emergency and asks for help or increased vigilance monitoring system includes: the system comprises an alarm monitoring module, a management module and a database, wherein the alarm monitoring module comprises a second correlation unit and an alarm unit. According to the invention, the accuracy of community security alarm is improved by performing related verification on the related security terminal and the related security subsystem of the security terminal which generates the alarm.

Description

Big data-based intelligent community security alarm system
Technical Field
The invention relates to the field of big data and intelligent community security, in particular to an intelligent community security alarm system based on big data.
Background
The intelligent community fully utilizes the integrated application of new-generation information technologies such as Internet of things, cloud computing and mobile internet, and provides a safe, comfortable and convenient modern and intelligent living environment for community residents, so that a community with a new management form based on informatization and intelligent social management and service is formed.
On one hand, the intelligent community innovating a management means promotes standardization, refinement and scientization of street work; meanwhile, a service mode is innovated, cultural, diversified and socialized public services are provided for residents, units and social organizations in the jurisdiction, the residents, the units and the social organizations in the jurisdiction are enabled to feel the new experience of intelligent life, a full-response intelligent state is enjoyed, and the purpose of 'management in the service and management in the service in a concrete way' is really realized. As a part of a smart city, the smart community also presents a fierce development situation under the promotion of the construction of the smart city. The intelligent community fully utilizes the electricity information technology, and relates to intelligent buildings, intelligent homes, security monitoring, intelligent community hospitals, community management services and the like.
At present, each security system of the community has the problems of different degrees, not complete equipment, but mutual independence between the systems, so that the system for community management and the system equipment have poor capability of mutual cooperation with the equipment, the emergency response capability is low, the equipment is various, a plurality of systems exist, the operation and maintenance workload is large, and the intellectualization is low. And because each system is independent, need more managers and maintainer, increase the administrative cost of community.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an intelligent community security alarm system based on big data, which comprises:
the intelligent community security and protection system comprises an intelligent community security and protection management platform, an intelligent community alarm monitoring system and a security and protection terminal, wherein the intelligent community security and protection management platform is in communication connection with the security and protection terminal and the intelligent community alarm monitoring system respectively;
the intelligent community security management platform comprises a plurality of security subsystems, and each security subsystem comprises an electronic fence system, a video monitoring system, an electronic patrol system and a parking management system;
the security subsystem comprises a call-back unit, a shuttle patrol detection unit, a first correlation unit and a database, and all the units are in communication connection;
wisdom community reports an emergency and asks for help or increased vigilance monitoring system includes: the system comprises an alarm monitoring module, a management module and a database, wherein the alarm monitoring module comprises a second correlation unit and an alarm unit;
each security subsystem carries out callback processing to obtain system check-up data of each security subsystem;
the shuttle inspection unit executes shuttle inspection on the security terminal according to the Satsugao characteristic data set and the terminal characteristic data;
when the shuttle patrol detection gives an alarm, the shuttle patrol detection unit sends a first correlation verification request instruction to the first correlation verification unit;
the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system verification data, and executes first correlation verification according to the first correlation verification criterion;
when the first correlation verification gives an alarm, the first correlation verification unit sends a second correlation verification request instruction to the alarm monitoring module;
the second correlation verification unit selects a second correlation verification criterion for the target security subsystem according to the system verification data and executes second correlation verification according to the second correlation verification criterion;
and when the second correlation verification gives an alarm, the alarm unit sends an alarm instruction to the management module.
According to a preferred embodiment, the callback processing of each security subsystem in the intelligent community security management platform comprises the following steps:
the callback unit in each security subsystem presets Satsuga characterization data for each security terminal in the security terminal list, and the callback unit processes the Satsuga characterization data of all the security terminals in the security terminal list to obtain a Satsuga characterization data set; the Sagay characterization data set is used for analyzing whether the security terminal gives an alarm or not;
the callback unit presets an interference verification criterion for each security subsystem according to a first interference constraint condition between the security subsystems and a second interference constraint condition between each security terminal in the security subsystems;
and the callback unit obtains system check-over data of each security subsystem according to the correlation verification criterion, the green-green characterization data set and the security terminal list of each security subsystem, and stores the system check-over data into the database of each security subsystem.
According to a preferred embodiment, the presetting of the correlation verification criterion for each security subsystem by the callback unit according to the first correlation constraint condition among the security subsystems and the second correlation constraint condition among the security terminals in the security subsystems comprises:
the callback unit sets a first correlation target function according to the minimum false alarm rate of the first correlation constraint condition among the security subsystems;
the callback unit maximizes the confidence coefficient according to a second correlation constraint condition among the security subsystems to set a second correlation target function;
the callback unit sets a target constraint condition according to the first correlation constraint condition and the second correlation constraint condition;
and the callback unit performs optimal solution according to the first related objective function, the second related objective function and the target constraint condition to obtain a related verification criterion.
According to a preferred embodiment, the callback unit setting the first related objective function according to the minimized false alarm rate of the first related constraint condition among the security subsystems comprises:
Figure BDA0002636679300000031
wherein, g1For the first related objective function, M is the number of security subsystems, N is the number of security terminals of the corresponding security subsystems, i is the index of the security subsystems, j is the index of the security terminals, UijThe total alarm times of the jth security terminal of the ith security subsystem are calculated; vijAnd the accurate alarm times of the jth security terminal of the ith security subsystem.
According to a preferred embodiment, the callback unit maximizes the confidence according to the second correlation constraint condition between the security subsystems to set the second correlation objective function includes:
Figure BDA0002636679300000032
wherein, g2Is a second related objective function, M is the number of the security sub-systems, and N is the security of the corresponding security sub-systemThe number of the security terminals, i is the index of the security subsystem, j is the index of the security terminal, hiIs the confidence of the ith security subsystem, qjAnd the confidence coefficient of the jth security terminal is obtained.
According to a preferred embodiment, the intelligent community security management platform comprises an electronic fence system, a video monitoring system, an electronic patrol system and a parking management system.
According to a preferred embodiment, the shuttle inspection unit performs shuttle inspection on the security terminal according to the Satsugao characteristic data set and the terminal characteristic data comprises:
the shuttle patrol detection unit processes the security terminal data collected by the security terminal to obtain terminal representation data;
the shuttle inspection unit analyzes and processes according to the terminal identifier of the security terminal and the Satsuga characterization data set to obtain Satsuga characterization data of the security terminal;
the shuttle inspection unit calculates the characterization matching degree of the terminal characterization data and the yerba characterization data;
when the representation matching degree is larger than the alarm threshold value, indicating that no alarm occurs in the shuttle inspection, and storing the security terminal identifier, the terminal representation data and the shuttle inspection result in a database of the security subsystem;
and when the characterization matching degree is smaller than the alarm threshold, indicating that the shuttle inspection generates an alarm, and executing first correlation verification.
According to a preferred embodiment, the first involvement verification unit performing the first involvement verification according to the first involvement verification criterion includes:
the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system verification data; the target security terminal is a security terminal which gives an alarm when executing the shuttle inspection;
the first correlation verification unit acquires a correlation security terminal list according to a first correlation verification criterion, and sends a first correlation verification request instruction to the corresponding correlation security terminal according to the correlation security terminal list;
each related security terminal responds to a received first related verification request instruction and sends terminal characterization data to a first related verification unit, and the first related verification unit executes first related verification according to a first related verification criterion and the terminal characterization data;
when the first correlation verification does not give an alarm, storing terminal representation data of the target security terminal, the identifier of the security terminal and a first correlation verification result into a database of the security subsystem;
and executing second correlation verification when the first correlation verification gives an alarm.
According to a preferred embodiment, the second correlation verification unit performing the second correlation verification according to the second correlation verification criterion includes:
the second correlation verification unit selects a second correlation verification criterion for the target security subsystem according to the system verification data; the target security subsystem is a security subsystem where a security terminal with a first related verification alarm is located;
the second correlation verification unit acquires a correlation security subsystem list according to a second correlation verification criterion, and sends a second correlation verification request instruction to the corresponding correlation security subsystem according to the correlation security subsystem list;
each related security subsystem responds to the received second related verification request instruction and sends the terminal characterization data set to a second related verification unit;
the second correlation verification unit processes the terminal representation data sets of all the correlated security subsystems to obtain a terminal representation data dictionary, and executes second correlation verification according to the terminal representation data dictionary and a second correlation verification criterion; the terminal characterization data set is obtained by processing the terminal characterization data of all security terminals in each related security subsystem;
when no alarm occurs in the second correlation verification, storing a second correlation verification result and the terminal representation data dictionary into a database of the intelligent community alarm system;
and when the second correlation verification gives an alarm, the alarm unit of the alarm monitoring module sends an alarm instruction to the management module.
According to a preferred embodiment, the correlation verification criterion is used for performing correlation verification, and comprises a first correlation verification criterion and a second correlation verification criterion;
the first relevancy verification criteria is used for performing first relevancy verification; the first correlation verification is correlation verification between the security terminals;
the second authentication criteria is for performing a second authentication; and the second correlation verification is the correlation verification between the security subsystems.
According to a preferred embodiment, the related security terminal is a security terminal which belongs to the same security subsystem as the target security terminal, has mutually crossed target monitoring areas and realizes different functions; the related security subsystem is a security subsystem which has mutually crossed target monitoring areas with the target security subsystem, has different functions, different data codes and different received data formats and can supplement each other in function.
According to a preferred embodiment, the security terminal is used for checking the security state of a target monitoring area and comprises an ultrasonic intrusion detector, an active infrared intrusion detector, a glass breaking detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera and a network camera.
When the shuttle patrol inspection is carried out on the security terminal, the security terminal giving an alarm in shuttle patrol inspection is subjected to the correlation verification and the security subsystem to which the security terminal belongs, and the comprehensive and multi-channel alarm information collection is realized through the cooperative verification between each security terminal and each security subsystem, so that false alarms caused by the faults of security equipment are reduced, the alarm accuracy is greatly improved, the working difficulty of security personnel is effectively reduced, and the comprehensive and effective recording and timely processing of alarm information are ensured.
Drawings
FIG. 1 is a block diagram of an intelligent community security alarm system according to an exemplary embodiment;
fig. 2 is a block diagram of a security subsystem according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, in one embodiment, a big data based intelligent community security alarm system includes: the intelligent community security and protection management system comprises an intelligent community security and protection management platform, an intelligent community alarming and monitoring system and a plurality of security and protection terminals, wherein the intelligent community security and protection management platform is in communication connection with the security and protection terminals respectively, and the intelligent community alarming and monitoring system is in communication connection with the intelligent community security and protection management platform.
The security terminal is used for checking the safety state of a target monitoring area, and comprises: the system comprises an ultrasonic intrusion detector, an active infrared intrusion detector, a glass breakage detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
The intelligent community security management platform comprises a plurality of security subsystems, wherein the security subsystems comprise but are not limited to an electronic fence system, a video monitoring system, an electronic patrol system and a parking management system.
Wisdom community reports an emergency and asks for help or increased vigilance monitoring system includes: alarm monitoring module, management module and database. The alarm monitoring module comprises a second correlation unit and an alarm unit.
And each security subsystem carries out first-phase correlation verification on the security terminal which gives an alarm in the shuttle inspection, and when the first-phase correlation verification gives an alarm, the first-phase correlation verification unit sends a second-phase correlation verification request instruction to an alarm monitoring module of the intelligent community alarm system.
And a second correlation verification unit of the alarm monitoring module selects a second correlation verification criterion for the target security subsystem according to the system verification data and executes second correlation verification according to the second correlation verification criterion.
And when the second correlation verification gives an alarm, the alarm unit of the alarm monitoring module sends an alarm instruction to the management module.
Referring to fig. 2, in one embodiment, the security subsystem may include: the system comprises a call-back unit, a shuttle patrol detection unit, a first correlation unit and a database. Wherein, each unit has communication connection.
And the callback unit of each security subsystem in the intelligent community security management platform carries out callback processing to obtain system verification data of each security subsystem.
And the shuttle inspection unit executes shuttle inspection on the security terminal according to the Satsugao characteristic data set and the terminal characteristic data.
When the shuttle patrol detection gives an alarm, the shuttle patrol detection unit sends a first correlation verification request instruction to a first correlation verification unit of the security subsystem;
the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system verification data, and executes first correlation verification according to the first correlation verification criterion.
In one embodiment, the security alarm method executed by the intelligent community security alarm system specifically comprises the following steps:
s1, each security subsystem in the intelligent community security management platform carries out callback processing to obtain system check-up data of each security subsystem; the system coverage verification data comprises a security terminal list, a large-leaf-mate characterization data set and related verification criteria.
Specifically, step S1 includes:
s1.1, presetting Satsugao characterization data for each security terminal in a security terminal list of each security subsystem by a callback unit in each security subsystem.
S1.2, the callback unit processes the Satsuga representation data of all the security terminals in the security terminal list to obtain a Satsuga representation data set, and the Satsuga representation data set is used for analyzing whether the security terminal gives an alarm or not.
S1.3, presetting an interference verification criterion for each security subsystem by a callback unit according to a first interference constraint condition between the security subsystems and a second interference constraint condition between each security terminal in the security subsystems.
Optionally, the presetting of the association verification criterion for each security subsystem by the callback unit according to the first association constraint condition between the security subsystems and the second association constraint condition between the security terminals in the security subsystems includes:
the callback unit sets a first correlation target function according to the minimum false alarm rate of the first correlation constraint condition among the security subsystems;
the callback unit maximizes the confidence coefficient according to a second correlation constraint condition among the security subsystems to set a second correlation target function;
the callback unit sets a target constraint condition according to the first correlation constraint condition and the second correlation constraint condition;
and the callback unit performs optimal solution according to the first related objective function, the second related objective function and the target constraint condition to obtain a related verification criterion.
Optionally, the callback unit minimizing the false alarm rate according to the first interference constraint condition between the security subsystems to set the first interference objective function includes:
Figure BDA0002636679300000081
wherein, g1For the first related objective function, M is the number of security subsystems, N is the number of security terminals of the corresponding security subsystems, i is the index of the security subsystems, j is the index of the security terminals, UijThe total alarm times of the jth security terminal of the ith security subsystem are calculated; vijAnd the accurate alarm times of the jth security terminal of the ith security subsystem.
Optionally, the callback unit maximizes the confidence according to a second correlation constraint condition between the security subsystems to set the second correlation objective function, including:
Figure BDA0002636679300000091
wherein, g2For the second related objective function, M is the number of the security sub-systems, N is the number of the security terminals of the corresponding security sub-systems, i is the index of the security sub-systems, j is the index of the security terminal, hiIs the confidence of the ith security subsystem, qjAnd the confidence coefficient of the jth security terminal is obtained.
And the callback unit obtains system check-over data of each security subsystem according to the correlation verification criterion, the green-green characterization data set and the security terminal list of each security subsystem, and stores the system check-over data into the database of each security subsystem.
Optionally, the Satsugao characterization data is preconfigured by a callback unit of the security subsystem according to terminal data of the security terminal in a normal state of the environment in the target monitoring area of the security terminal.
Optionally, the security terminal list includes a terminal name and a terminal identifier of the security terminal that establishes a communication connection with the security subsystem and can implement a security function related to the security subsystem.
Optionally, the relevancy verification criteria is for performing relevancy verification; the relevancy verification criteria include a first relevancy verification criteria and a second relevancy verification criteria.
The first correlation verification criterion is used for executing first correlation verification, and the first correlation verification is correlation verification between the security terminals.
And the second correlation verification criterion is used for executing second correlation verification, and the second correlation verification is correlation verification among the security subsystems.
Optionally, the smart community security management platform comprises an electronic fence system, a video monitoring system, an electronic patrol system and a parking management system.
In one embodiment, the fence system performs callback processing to obtain a list of related fence hardware security devices, a list of Satsugao characterization data sets, and related validation criteria.
Optionally, the electronic fence system comprises: optical fiber detector, temperature detector, pressure detector, vibrations detector.
The pertinent validation criteria include: and (4) related verifying related security terminal lists and verification rules.
And S2, the shuttle inspection unit of the security subsystem executes shuttle inspection on the security terminal according to the Satsugao characteristic data set and the terminal characteristic data, and when the shuttle inspection gives an alarm, the shuttle inspection unit sends a first correlation authentication request instruction to the first correlation authentication unit of the security subsystem.
Specifically, the shuttle patrol detection comprises the step that a shuttle patrol detection unit processes security terminal data collected by a security terminal to obtain terminal characterization data.
The shuttle inspection unit analyzes and processes according to the terminal identifier of the security terminal and the Satsuga characterization data set to obtain Satsuga characterization data of the security terminal;
and the shuttle inspection unit calculates the characterization matching degree of the terminal characterization data and the yerba characterization data.
Specifically, the process of calculating the token matching degree is as follows:
extracting a terminal characterization vector Q ═ Q from terminal characterization data1,q2,q3…qn]And n is the number of the characteristics of the terminal characterization data, and each element of the terminal characterization vector is the characteristic value of the corresponding characteristic.
Extracting Satsuga characterization vector S-from Satsuga characterization data1,s2,s3…sn]And n is the characteristic number of the Satsugao characteristic data, and each element of the Satsugao characteristic vector is the characteristic standard value of the corresponding characteristic.
Calculating the degree of matching of the characteristics
Figure BDA0002636679300000101
Where n is the number of features and i is the feature index.
And when the representation matching degree P is greater than the alarm threshold value, indicating that no alarm occurs in the shuttle inspection, and storing the security terminal identifier, the terminal representation data and the shuttle inspection result in a database of the security subsystem.
And when the characterization matching degree P is smaller than the alarm threshold, indicating that the shuttle inspection generates an alarm, and executing first correlation verification.
Optionally, the alarm threshold is a critical value preset by the system for determining that an alarm occurs in the shuttle detection.
According to a preferred embodiment, when the shuttle patrol detection unit of the electronic fence system performs shuttle patrol detection on each security terminal in the security terminal list, the fact that the characteristic matching degree obtained by calculating the terminal characteristic data obtained by processing the sensing data received from a certain infrared detector and the green tea characteristic data is 55% and is less than 85% of the alarm threshold value set by the electronic fence system indicates that the infrared detector finds abnormality and the shuttle patrol detection gives an alarm is found.
Optionally, the security terminal is used for checking the security state of a target monitoring area, and includes an ultrasonic intrusion detector, an active infrared intrusion detector, a glass breakage detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera, and a web camera.
S3, the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system verification data, executes first correlation verification according to the first correlation verification criterion, and sends a second correlation verification request instruction to an alarm monitoring module of the intelligent community alarm system when the first correlation verification gives an alarm.
Specifically, step S3 includes:
s3.1, the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system repeated verification data, and the target security terminal is a security terminal giving an alarm when the shuttle inspection is executed.
S3.2, the first correlation verification unit obtains a correlation security terminal list according to a first correlation verification criterion, and sends a first correlation verification request instruction to the corresponding correlation security terminal according to the correlation security terminal list.
The related security terminal list is a list of security terminals related to the target security terminal in the first related verification criterion.
And S3.3, each related security terminal responds to the received first related verification request instruction to send terminal characterization data to a first related verification unit, and the first related verification unit executes first related verification according to a first related verification criterion and the terminal characterization data.
And when the first correlation verification does not give an alarm, storing the terminal representation data of the target security terminal, the identifier of the security terminal and the first correlation verification result into a database of the security subsystem.
And executing second correlation verification when the first correlation verification gives an alarm.
Optionally, the process of acquiring the related security terminal list by the first related verification unit according to the first related verification criterion includes: the first correlation verification unit acquires the terminal identifier of the related security terminal related to the first correlation verification criterion, and adds the terminal identifier of the related security terminal and the security terminal name to the related security terminal list.
According to a preferred embodiment, when the electronic fence system performs shuttle inspection on the security terminal, an alarm is given, and the target security terminal infrared detector giving the alarm sends an identifier of the infrared detector to the first correlation verification unit, and the first correlation verification unit obtains a first correlation verification criterion from system verification data according to the identifier of the infrared detector, for example, the first correlation verification criterion of the infrared detector is to perform correlation verification with the temperature detector, the vibration detector and the pressure detector.
The first correlation verification unit acquires a correlation security terminal list according to a first correlation verification criterion, sends first correlation verification request instructions to a temperature detector, a vibration detector and a pressure detector respectively according to terminal identifiers in the security terminal list, the detectors which receive the first correlation verification request instructions send respective terminal characterization data to the first correlation verification unit, and the first correlation verification unit judges whether alarm occurs during execution of first correlation verification according to the received terminal characterization data.
Optionally, the first relevant verification criterion is a relevant verification criterion related to a target security terminal being verified in the relevant verification criteria.
When the security subsystem detects that the security terminal gives an alarm, the security subsystem does not directly give an alarm, but verifies whether security terminal data acquired by other security terminals related to the security terminal are abnormal or not through the first related verification unit, so that false alarm caused by failure of security terminal equipment is avoided.
And S4, selecting a second correlation verification criterion for the target security subsystem by a second correlation verification unit of the alarm monitoring module according to the system re-verification data, and executing second correlation verification according to the second correlation verification criterion.
Specifically, step S4 includes:
and S4.1, selecting a second correlation verification criterion for the target security subsystem by the second correlation verification unit according to the system verification data.
The target security subsystem is a security subsystem where a security terminal where the first related verification occurs and the alarm occurs is located.
And S4.2, the second correlation verification unit acquires a correlation security subsystem list according to a second correlation verification criterion, and sends a second correlation verification request instruction to the corresponding correlation security subsystem according to the correlation security subsystem list.
The related security subsystem list is a list of security subsystems related to the target security subsystem in the second related verification criterion.
And S4.3, each related security subsystem responds to the received second related verification request instruction and sends the terminal characterization data set to a second related verification unit.
And S4.4, the second correlation verification unit processes the terminal representation data sets of all the correlated security subsystems to obtain a terminal representation data dictionary, and the second correlation verification unit executes second correlation verification according to the terminal representation data dictionary and a second correlation verification criterion.
And the terminal characterization data set is obtained by processing the terminal characterization data of all security terminals in each related security subsystem.
And when no alarm occurs in the second correlation verification, storing the second correlation verification result and the terminal representation data dictionary into a database of the intelligent community alarm system.
And when the second correlation verification gives an alarm, the alarm unit of the alarm monitoring module sends an alarm instruction to the management module.
Optionally, when the infrared detector performs first-phase correlation verification and gives an alarm, a first-phase correlation verification module in the electronic fence system sends a second-phase correlation verification request instruction to an alarm monitoring module of the smart community alarm system, a second-phase correlation verification unit in the alarm monitoring module selects a second-phase correlation verification criterion for the electronic fence system according to system verification data, and the second-phase correlation verification criterion is that second-phase correlation verification is performed with the video monitoring system.
The second correlation verification unit sends a second verification request instruction to the video monitoring system, the video monitoring system sends a terminal characterization data set of the video monitoring system to the second correlation verification unit, the terminal characterization data set is a set of all security terminal characterization data of the video monitoring system, and the terminal characterization data set comprises video image data collected by each monitoring terminal device and changes in a target monitoring area of the monitoring terminal device, for example, when the monitoring terminal device shoots that an intruder crosses a fence, the second correlation verification unit gives an alarm when performing second verification.
Optionally, the related security terminal is a security terminal which has a target monitoring area mutually intersected with the target security terminal and belongs to the same security subsystem to realize different functions, and the related security subsystem is a security subsystem which has a target monitoring area mutually intersected with the target security subsystem, has different functions, different data codes, different received data formats and mutually complementary functions.
According to the invention, the intelligent community alarm platform is used for carrying out second correlation verification on the target security subsystem, so that the target security subsystem can carry out cooperative verification with other security subsystems, and the changes monitored in the same target monitoring area among the security subsystems can be mutually verified, so that the occupation of false alarms on manpower resources can be effectively reduced, and the alarm result is more accurate.
And S5, when the second correlation verification gives an alarm, the alarm unit of the alarm monitoring module sends an alarm instruction to the management module. And the manager performs precaution processing according to the alarm instruction and the data acquired by the security terminal.
When the shuttle patrol inspection is carried out on the security terminal, the security terminal giving an alarm in shuttle patrol inspection is subjected to the correlation verification and the security subsystem to which the security terminal belongs, and the comprehensive and multi-channel alarm information collection is realized through the cooperative verification between each security terminal and each security subsystem, so that false alarms caused by the faults of security equipment are reduced, the alarm accuracy is greatly improved, the working difficulty of security personnel is effectively reduced, and the comprehensive and effective recording and timely processing of alarm information are ensured.
In one embodiment, when no alarm is found in the first-phase-related verification, the first-phase-related verification unit judges that the shuttle detection process is abnormal, and sends a feedback message of the abnormal shuttle detection to the corresponding security subsystem, and the corresponding security subsystem checks the shuttle detection. The abnormal shuttle patrol detection process comprises equipment failure of the security terminal and the like.
The shuttle patrol detection process is reversely detected through the first correlation verification, and the abnormal shuttle patrol detection process is timely processed, so that the condition of false alarm caused by the abnormal shuttle patrol detection process is avoided.
In one embodiment, when no alarm is found in the second correlation verification, the second correlation verification unit judges that the first correlation verification process is abnormal, and sends a feedback message of the abnormality of the first correlation verification to the corresponding security subsystem, and the corresponding security subsystem verifies the first correlation verification.
The first correlation verification process is reversely detected through the second correlation verification, and the abnormal first correlation verification process is processed in time, so that the condition of false alarm caused by the abnormal first correlation verification process is avoided.
Additionally, while particular functionality is discussed above with reference to particular modules, it should be noted that the functionality of the various modules discussed herein may be separated into multiple modules and/or at least some of the functionality of multiple modules may be combined into a single module. Additionally, a particular module performing an action discussed herein includes the particular module itself performing the action, or alternatively the particular module invoking or otherwise accessing another component or module that performs the action (or performs the action in conjunction with the particular module). Thus, a particular module that performs an action can include the particular module that performs the action itself and/or another module that the particular module that performs the action calls or otherwise accesses.
Although the present invention has been described in connection with some embodiments, it is not intended to be limited to the specific form set forth herein. Rather, the scope of the invention is limited only by the appended claims. The order of features in the claims does not imply any specific order in which the features must be worked. Furthermore, in the claims, the word "comprising" does not exclude other elements, and the indefinite article "a" or "an" does not exclude a plurality.

Claims (9)

1. A smart community security alarm system based on big data is characterized by comprising a smart community security management platform, a smart community alarm monitoring system and a security terminal, wherein the smart community security management platform is in communication connection with the security terminal and the smart community alarm monitoring system respectively;
the intelligent community security management platform comprises a plurality of security subsystems, and each security subsystem comprises an electronic fence system, a video monitoring system, an electronic patrol system and a parking management system;
the security subsystem comprises a call-back unit, a shuttle patrol detection unit, a first correlation unit and a database, and all the units are in communication connection;
wisdom community reports an emergency and asks for help or increased vigilance monitoring system includes: the system comprises an alarm monitoring module, a management module and a database, wherein the alarm monitoring module comprises a second correlation unit and an alarm unit;
each security subsystem carries out callback processing to obtain system check-up data of each security subsystem;
the shuttle inspection unit executes shuttle inspection on the security terminal according to the Satsugao characteristic data set and the terminal characteristic data;
when the shuttle patrol detection gives an alarm, the shuttle patrol detection unit sends a first correlation verification request instruction to the first correlation verification unit;
the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system verification data, and executes first correlation verification according to the first correlation verification criterion;
when the first correlation verification gives an alarm, the first correlation verification unit sends a second correlation verification request instruction to the alarm monitoring module;
the second correlation verification unit selects a second correlation verification criterion for the target security subsystem according to the system verification data and executes second correlation verification according to the second correlation verification criterion;
and when the second correlation verification gives an alarm, the alarm unit sends an alarm instruction to the management module.
2. The system of claim 1, wherein the security terminal is configured to check a security status of a target monitoring area, and comprises: the system comprises an ultrasonic intrusion detector, an active infrared intrusion detector, a glass breakage detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
3. The system of claim 2, wherein the callback processing of each security subsystem in the intelligent community security management platform comprises:
the callback unit in each security subsystem presets Satsugao characterization data for each security terminal in the security terminal list;
the callback unit processes the Satsuga characterization data of all the security terminals in the security terminal list to obtain a Satsuga characterization data set;
the callback unit presets an interference verification criterion for each security subsystem according to a first interference constraint condition between the security subsystems and a second interference constraint condition between each security terminal in the security subsystems;
and the callback unit obtains system check-over data of each security subsystem according to the correlation verification criterion, the green-green characterization data set and the security terminal list of each security subsystem, and stores the system check-over data into the database of each security subsystem.
4. The system of claim 3, wherein the callback unit presets the correlation verification criterion for each security subsystem according to the first correlation constraint between the security subsystems and the second correlation constraint between the security terminals in the security subsystems comprises:
the callback unit sets a first correlation target function according to the minimum false alarm rate of the first correlation constraint condition among the security subsystems;
the callback unit maximizes the confidence coefficient according to a second correlation constraint condition among the security subsystems to set a second correlation target function;
the callback unit sets a target constraint condition according to the first correlation constraint condition and the second correlation constraint condition;
and the callback unit performs optimal solution according to the first related objective function, the second related objective function and the target constraint condition to obtain a related verification criterion.
5. The system of claim 4, wherein the callback unit minimizing the false alarm rate according to the first interference constraint condition between the security subsystems to set the first interference objective function comprises:
Figure FDA0002636679290000021
wherein, g1For the first related objective function, M is the number of security subsystems, N is the number of security terminals of the corresponding security subsystems, i is the index of the security subsystems, j is the index of the security terminals, UijThe total alarm times of the jth security terminal of the ith security subsystem are calculated; vijAnd the accurate alarm times of the jth security terminal of the ith security subsystem.
6. The system of claim 5, wherein the first correlation verification unit performing the first correlation verification according to the first correlation verification criterion comprises:
the first correlation verification unit selects a first correlation verification criterion for the target security terminal according to the system verification data;
the first correlation verification unit acquires a correlation security terminal list according to a first correlation verification criterion, and sends a first correlation verification request instruction to the corresponding correlation security terminal according to the correlation security terminal list;
each related security terminal responds to a received first related verification request instruction and sends terminal characterization data to a first related verification unit;
the first correlation verification unit executes first correlation verification according to a first correlation verification criterion and the terminal characterization data.
7. The system of claim 6, wherein the second correlation verification unit performing the second correlation verification according to the second correlation verification criteria comprises:
the second correlation verification unit selects a second correlation verification criterion for the target security subsystem according to the system verification data;
the second correlation verification unit acquires a correlation security subsystem list according to a second correlation verification criterion, and sends a second correlation verification request instruction to the corresponding correlation security subsystem according to the correlation security subsystem list;
each related security subsystem responds to the received second related verification request instruction and sends the terminal characterization data set to a second related verification unit;
the second correlation verification unit processes the terminal representation data sets of all the correlated security subsystems to obtain a terminal representation data dictionary;
and the second correlation verification unit executes second correlation verification according to the terminal characterization data dictionary and a second correlation verification criterion.
8. The system of claim 7, wherein the related security subsystems are security subsystems which have mutually intersected target monitoring areas with target security subsystems and are different in implementation function, data coding and receiving data format and are mutually complemented in function.
9. The system of claim 8, wherein the related security terminal is a security terminal belonging to the same security subsystem as the target security terminal, having mutually intersecting target monitoring areas and implementing different functions.
CN202010827295.5A 2020-08-17 2020-08-17 Big data-based intelligent community security alarm system Withdrawn CN111968324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010827295.5A CN111968324A (en) 2020-08-17 2020-08-17 Big data-based intelligent community security alarm system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010827295.5A CN111968324A (en) 2020-08-17 2020-08-17 Big data-based intelligent community security alarm system

Publications (1)

Publication Number Publication Date
CN111968324A true CN111968324A (en) 2020-11-20

Family

ID=73388211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010827295.5A Withdrawn CN111968324A (en) 2020-08-17 2020-08-17 Big data-based intelligent community security alarm system

Country Status (1)

Country Link
CN (1) CN111968324A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113593173A (en) * 2021-06-21 2021-11-02 安徽星辰智创信息科技有限公司 Community security alarm system based on big data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113593173A (en) * 2021-06-21 2021-11-02 安徽星辰智创信息科技有限公司 Community security alarm system based on big data
CN113593173B (en) * 2021-06-21 2024-04-05 安徽星辰智创信息科技有限公司 Community security alarm system based on big data

Similar Documents

Publication Publication Date Title
CN110223146B (en) System and method for monitoring whole process of electricity purchasing service of customer
CN110837582A (en) Data association method and device, electronic equipment and computer-readable storage medium
CN112329688A (en) Intelligent risk management and control system for public places
KR20140080738A (en) Building Integrated Network Management Sever and Managing Method Thereof
CN112489252A (en) Real-time network engineering monitoring alarm system
CN115880631A (en) Power distribution station fault identification system, method and medium
CN111968324A (en) Big data-based intelligent community security alarm system
CN101394467B (en) Intelligent main control system for reinforcement digital video monitoring terminal system
CN111968325A (en) Intelligent community security alarm method
CN112669486B (en) Intelligent security patrol management system
CN109996043A (en) Construction monitoring method, electronic equipment and construction monitoring system
CN112070191A (en) Workshop management and control system
KR100343045B1 (en) A burglar alarm and method thereof by internet
CN114553725B (en) Machine room monitoring alarm method and device, electronic equipment and storage medium
CN115273369A (en) Intelligent household security monitoring device and monitoring method thereof
KR20020012079A (en) A monitoring system with floating IP address, a web image monitoring system using the system and a method of the same
CN111708354B (en) Smart hotel terminal fault detection method based on big data
CN110324881B (en) Security protection information transmission method based on Internet of things, security protection system and computer readable medium
CN112489390B (en) Security node collaborative alarm method based on intelligent security
CN110430390A (en) A kind of corridor recognition of face monitoring system
CN112291263A (en) Data blocking method and device
CN111784987B (en) Intelligent security alarm system
CN116405328B (en) Multistage linkage network security supervision system and method for power monitoring system
CN116976867B (en) Face recognition management system based on data analysis
CN117115957B (en) Access control method and system based on intelligent community

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201120