CN112396791A - Intrusion behavior alarm method and device, storage medium and electronic device - Google Patents

Intrusion behavior alarm method and device, storage medium and electronic device Download PDF

Info

Publication number
CN112396791A
CN112396791A CN202011348141.4A CN202011348141A CN112396791A CN 112396791 A CN112396791 A CN 112396791A CN 202011348141 A CN202011348141 A CN 202011348141A CN 112396791 A CN112396791 A CN 112396791A
Authority
CN
China
Prior art keywords
target area
belongs
objects
belong
active
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011348141.4A
Other languages
Chinese (zh)
Inventor
岳冬
陈翀
王玉宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011348141.4A priority Critical patent/CN112396791A/en
Publication of CN112396791A publication Critical patent/CN112396791A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/886Radar or analogous systems specially adapted for specific applications for alarm systems

Landscapes

  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Burglar Alarm Systems (AREA)
  • Emergency Alarm Devices (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The application discloses an intrusion behavior alarm method and device, a storage medium and an electronic device. Wherein, the method comprises the following steps: detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting an object invading the target area; and sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists. The method and the device solve the technical problem that detection errors are easy to occur in the related technology.

Description

Intrusion behavior alarm method and device, storage medium and electronic device
Technical Field
The application relates to the field of security and protection, in particular to an intrusion behavior alarm method and device, a storage medium and an electronic device.
Background
In the era of interconnection of everything, artificial intelligence technology begins to advance into people's daily life, driving security industry to develop towards intellectuality, networking and the like. Most of the existing devices widely applied to the security field are composed of infrared rays, laser and a camera.
According to the method, the position of the unmanned aerial vehicle is determined by adopting the two millimeter wave radars, the unmanned aerial vehicle is shot by the camera, and finally the detection system completes the functions of identifying and early warning the invading unmanned aerial vehicle.
In patent document CN108802758A, an intelligent security system based on a laser radar is used to perform data fusion between the laser radar and a photoelectric detection device, so as to realize 360-degree detection and tracking of a target.
In the first scheme, the millimeter wave radar is used as a positioning device for photographing by a camera, the functions of detecting and classifying targets in a range cannot be realized, the workload of the camera is reduced, and in home security, the camera has a certain privacy disclosure risk and cannot be used as a security principal. In the second scheme, the stability and reliability of the system are improved by the data fusion algorithm, but the laser radar is not suitable for popularization of the home security system due to the expensive price. Due to the change of the external environment, such as the change of brightness and temperature, the detection error of the device is easily caused, and the condition of wrong early warning of the system is caused.
In view of the above-mentioned problem that detection errors are likely to occur in the related art, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the application provides an intrusion behavior alarm method and device, a storage medium and an electronic device, so as to at least solve the technical problem that detection errors are easy to occur in the related technology.
According to an aspect of an embodiment of the present application, there is provided an intrusion behavior alarming method, including: detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting an object invading the target area; and sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
Optionally, in determining whether the active object belongs to a trusted object, determining whether the active object belongs to a target type of creature; in the event that it is determined that the moving object belongs to the target type of creature, determining whether the moving object belongs to an object in a set of objects, wherein the set of objects is a set of objects allowed to enter the target area; in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object; determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
Optionally, when determining whether the moving object belongs to a living being of a target type, distinguishing whether the moving object is a living being of the target type according to a distance of movement between targets and doppler shift information by using a first classifier, wherein the living being of the target type includes a human being.
Optionally, when determining whether the moving object belongs to an object in an object set, determining whether the moving object belongs to the object in the object set by comparing feature information composed of a distance and a doppler shift when different body part motions of the moving object are combined with feature information of the object in the object set by using a second classifier.
Optionally, before determining whether the moving object belongs to the object in the object set, when the object in the object set moves, the characteristic information composed of the distance and the doppler shift when the different body part motions of the human body of the object are combined is collected and stored.
Optionally, prior to determining that the active object does not belong to a trusted object, determining whether a guest record configured for the target area exists; in an instance in which it is determined that there is no guest record configured for the target area, determining that the active object does not belong to a trusted object.
Optionally, when a moving object is detected in a target area by a millimeter wave radar, transmitting a radar signal by the millimeter wave radar, and receiving a reflected point cloud signal; determining that the moving object is detected in the target area in a case where the number of point cloud signals is greater than a set threshold value.
According to another aspect of the embodiments of the present application, there is also provided an intrusion behavior alarm apparatus, including: the detection unit is used for detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting the object invading the target area; and the alarm unit is used for sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
Optionally, the alarm unit is further configured to determine whether the moving object belongs to a target type of living being when determining whether the moving object belongs to a trusted object; in the event that it is determined that the moving object belongs to the target type of creature, determining whether the moving object belongs to an object in a set of objects, wherein the set of objects is a set of objects allowed to enter the target area; in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object; determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
Optionally, the alarm unit is further configured to distinguish, by using the first classifier, whether the moving object is a living being belonging to a target type according to a distance moved between targets and doppler shift information when determining whether the moving object belongs to the living being of the target type, wherein the living being of the target type includes a human being.
Optionally, the alarm unit is further configured to, when determining whether the moving object belongs to an object in an object set, determine whether the moving object belongs to the object in the object set by comparing feature information composed of a distance and a doppler shift when different body part motions of a human body of the moving object are combined with feature information of the objects in the object set by using a second classifier.
Optionally, the alarm unit is further configured to acquire and store characteristic information composed of a distance and a doppler shift when different body part motions of the human body of the subject are combined when the objects in the object set move before determining whether the moving object belongs to the objects in the object set.
Optionally, the alert unit is further configured to determine whether a guest record configured for the target area exists before determining that the active object does not belong to a trusted object; in an instance in which it is determined that there is no guest record configured for the target area, determining that the active object does not belong to a trusted object.
Optionally, the detection unit is further configured to, when a moving object is detected in a target area by a millimeter wave radar, transmit a radar signal by using the millimeter wave radar, and receive a reflected point cloud signal; determining that the moving object is detected in the target area in a case where the number of point cloud signals is greater than a set threshold value.
According to another aspect of the embodiments of the present application, there is also provided a storage medium including a stored program which, when executed, performs the above-described method.
According to another aspect of the embodiments of the present application, there is also provided an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the above method through the computer program.
In the embodiment of the application, the millimeter wave radar is placed in a position (such as a living room and a bedroom) to be detected in a family, and detection and tracking of personnel in an activity area are completed according to the human body echo received by the radar. When the early warning mode is started by the system, the system classifies the moving targets in the detection area, the interference of non-human targets (such as a sweeping robot and an electric fan) is eliminated, if the moving targets without labels appear, the system reminds a house owner to take corresponding measures by monitoring security app, the functions comprise acousto-optic reminding, one-key alarming and even door and window locking functions, and the technical problem that detection errors easily occur in the related technology can be solved because the radar detection is not influenced by factors such as light rays.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of an alternative intrusion behavior alerting method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative target classification scheme according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative intrusion behavior alert scenario according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an alternative intrusion behavior alerting device according to an embodiment of the present application;
and
fig. 5 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Due to the change of the external environment, such as the change of brightness and temperature, the detection error of the device is easily caused, and the condition of wrong early warning of the system is caused. In order to solve the problem, according to an aspect of the embodiments of the present application, an embodiment of an alarm method for an intrusion behavior is provided, which can implement intelligent security based on a millimeter wave radar signal, start an early warning function to detect a moving target in a room, and trigger an alarm if a stranger is detected, thereby ensuring the security of lives and properties of people and the information security of private areas. Fig. 1 is a flowchart of an alternative intrusion behavior alerting method according to an embodiment of the present application, and as shown in fig. 1, the method may include the following steps:
step S1, a moving object is detected in a target area by a millimeter wave radar for detecting an object intruding the target area.
Optionally, when a moving object is detected in a target area (such as a bedroom or a living room lamp) by a millimeter wave radar, transmitting a radar signal by using the millimeter wave radar, and receiving a reflected point cloud signal; determining that the moving object is detected in the target area in a case where the number of point cloud signals is greater than a set threshold value.
And step S2, sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
Optionally, in determining whether the active object belongs to a trusted object, determining whether the active object belongs to a target type of living being (e.g., whether it belongs to a human being); in the event that it is determined that the active object belongs to the target type of creature, determining whether the active object belongs to an object in a set of objects (e.g., a set of family members), wherein the set of objects is a set of objects allowed to enter the target area; in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object; determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
Optionally, when determining whether the moving object belongs to a living being of a target type, distinguishing whether the moving object is a living being of the target type according to a distance of movement between targets and doppler shift information by using a first classifier, wherein the living being of the target type includes a human being.
Optionally, when determining whether the moving object belongs to an object in the object set, using a second classifier, it is determined whether the moving object belongs to the object in the object set by comparing feature information composed of a distance and a doppler shift when different body part motions of the moving object are combined with feature information (such as gait information) of the objects in the object set.
Optionally, before determining whether the moving object belongs to the object in the object set, when the object in the object set moves, the characteristic information composed of the distance and the doppler shift when the different body part motions of the human body of the object are combined is collected and stored.
Optionally, prior to determining that the active object does not belong to a trusted object, determining whether a guest record configured for the target area exists; in an instance in which it is determined that there is no guest record configured for the target area, determining that the active object does not belong to a trusted object.
Through the steps, the millimeter wave radar is placed in a position (such as a living room, a bedroom and the like) to be detected in a family, and detection and tracking of personnel in an activity area are completed according to the human body echo received by the radar. When the early warning mode is started by the system, the system classifies the moving targets in the detection area, the interference of non-human targets (such as a sweeping robot and an electric fan) is eliminated, if the moving targets without labels appear, the system reminds a house owner to take corresponding measures by monitoring security app, the functions comprise acousto-optic reminding, one-key alarming and even door and window locking functions, and the technical problem that detection errors easily occur in the related technology can be solved because the radar detection is not influenced by factors such as light rays.
The detection equipment to indoor personnel to the tradition includes ultrasonic wave, infrared and optical camera etc. and millimeter wave radar receives extensive good comment with its stability in the detection ring border, and the condition that image information that the data of also can not appearing the camera collection was stolen to cause loses simultaneously has the guard action to individual privacy. Meanwhile, for the abnormal conditions at home, the home information is fed back through the monitoring security App, and the functions of one-key defense deployment and abnormal alarm are remotely completed. As an alternative example, as shown in fig. 2 and fig. 3, the following further details the technical solution of the present application with reference to specific embodiments.
In recent years, with the development of target detection technology, a target detection algorithm based on a camera is widely applied to home security, however, as an optical component, the light condition becomes a limitation based on camera detection, that is, the recognition rate of a system is not high under the conditions of overexposure and darkness, so that the condition of missed detection is caused, and the loss of immeasurability is caused. The intelligent security system based on the millimeter wave radar signals is free from interference of external environment, has stable detection performance, can realize 24-hour monitoring all day long, and finally realizes early warning and related operation on abnormal information by using an App. Meanwhile, the millimeter wave radar can be accessed into an intelligent household scene, linkage of various functions is realized, and the early warning mode of the intelligent security system based on the millimeter wave radar signal is described in detail.
As shown in fig. 2, a flowchart of a target classification method of a millimeter wave radar is shown, in which an LFMCW (using a chirped continuous wave waveform) radar calculates target distance and velocity information using a frequency difference between a radar transmission signal and an echo signal, and then obtains a two-dimensional doppler-distance two-dimensional image using a 2D-FFT (two-dimensional fast fourier transform) with noise suppression. In the actual process, when clutter echo and hostile noise interference are much larger than received internal noise, the situation of wrong early warning can occur, and in order to avoid the situation, the CA-CFAR algorithm is adopted as a self-adaptive threshold to improve the anti-interference capability. In the process of classifying the targets, two SVM classifiers are trained, one is to distinguish the moving targets (such as a sweeping robot, a fan, a curtain and the like) of a person from a non-person according to the moving distance and Doppler frequency shift information between different targets, the other is to form gait information of family members according to the distance and Doppler frequency shift when different body parts (including trunk movement, limb swing and movement amplitude) of a human body are combined, and finally, the characteristics are obtained according to the average difference between an upper envelope line and a lower envelope line of the point cloud and the minimum Doppler.
Fig. 3 shows a flowchart of an intelligent security system based on millimeter-wave radar signals, which includes a millimeter-wave radar signal processing process, a target classification and tracking process, and a final security alarm function. The method comprises the steps of firstly analyzing echo information of the millimeter wave radar, judging as a moving target if the number of point clouds is larger than a set threshold value, and carrying out clustering and tracking operation of the subsequent point clouds. Sending the target into a first classifier for judgment, and if the target is a non-human target, for example, recording and informing a user to pay attention to closing a window when detecting the swinging of a curtain in an early warning mode; if the human target is the human target, the second classifier is used for judging in the early warning mode, and if the human target is a family member, no reminding is performed. And if the active target is an unknown ID, the system checks whether the visitor applies to the app end, and if not, the system judges that the target is an intrusion target and reminds the user of giving an alarm.
In the above scheme, the system classification model is not limited to the SVM, and other algorithms with higher classification accuracy than the model are also within the protection scope of the present invention; the early warning condition can be judged by combining the opening and closing of the curtain and the door, and under the early warning mode, if the swinging of the curtain or the door is detected and an unknown ID exists in the area, the window is judged as an intruder.
The intelligent security system based on the millimeter wave radar signals detects and tracks the moving target by utilizing the millimeter wave radar technology, and sets member tags according to the walking habits of family members, thereby realizing the function of identifying the family members. Under the early warning mode, for unknown human ID, a householder is reminded to make corresponding measures through monitoring security app, wherein the measures comprise sound and light reminding, one-key alarming and even door and window locking functions.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
According to another aspect of the embodiment of the application, an intrusion behavior alarming device for implementing the intrusion behavior alarming method is further provided. Fig. 4 is a schematic diagram of an alternative intrusion behavior warning device according to an embodiment of the present application, and as shown in fig. 4, the device may include:
a detection unit 41 configured to detect a moving object in a target area by a millimeter wave radar configured to detect an object intruding the target area; an alarm unit 43, configured to send alarm information in a case that the active object does not belong to a trusted object, where the alarm information is used to indicate that there is an object intruding into the target area.
It should be noted that the detecting unit 41 in this embodiment may be configured to execute step S1 in this embodiment, and the alarm unit 43 in this embodiment may be configured to execute step S2 in this embodiment.
Through the module, the millimeter wave radar is placed in a position (such as a living room, a bedroom and the like) to be detected in a family, and detection and tracking of personnel in an activity area are completed according to human body echoes received by the radar. When the early warning mode is started by the system, the system classifies the moving targets in the detection area, the interference of non-human targets (such as a sweeping robot and an electric fan) is eliminated, if the moving targets without labels appear, the system reminds a house owner to take corresponding measures by monitoring security app, the functions comprise acousto-optic reminding, one-key alarming and even door and window locking functions, and the technical problem that detection errors easily occur in the related technology can be solved because the radar detection is not influenced by factors such as light rays.
Optionally, the alarm unit is further configured to determine whether the moving object belongs to a target type of living being when determining whether the moving object belongs to a trusted object; in the event that it is determined that the moving object belongs to the target type of creature, determining whether the moving object belongs to an object in a set of objects, wherein the set of objects is a set of objects allowed to enter the target area; in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object; determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
Optionally, the alarm unit is further configured to distinguish, by using the first classifier, whether the moving object is a living being belonging to a target type according to a distance moved between targets and doppler shift information when determining whether the moving object belongs to the living being of the target type, wherein the living being of the target type includes a human being.
Optionally, the alarm unit is further configured to, when determining whether the moving object belongs to an object in an object set, determine whether the moving object belongs to the object in the object set by comparing feature information composed of a distance and a doppler shift when different body part motions of a human body of the moving object are combined with feature information of the objects in the object set by using a second classifier.
Optionally, the alarm unit is further configured to acquire and store characteristic information composed of a distance and a doppler shift when different body part motions of the human body of the subject are combined when the objects in the object set move before determining whether the moving object belongs to the objects in the object set.
Optionally, the alert unit is further configured to determine whether a guest record configured for the target area exists before determining that the active object does not belong to a trusted object; in an instance in which it is determined that there is no guest record configured for the target area, determining that the active object does not belong to a trusted object.
Optionally, the detection unit is further configured to, when a moving object is detected in a target area by a millimeter wave radar, transmit a radar signal by using the millimeter wave radar, and receive a reflected point cloud signal; determining that the moving object is detected in the target area in a case where the number of point cloud signals is greater than a set threshold value.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules as a part of the apparatus may run in a corresponding hardware environment, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to another aspect of the embodiment of the application, a server or a terminal for implementing the alarm method of the intrusion behavior is also provided.
Fig. 5 is a block diagram of a terminal according to an embodiment of the present application, and as shown in fig. 5, the terminal may include: one or more processors 201 (only one shown), memory 203, and transmission means 205, as shown in fig. 5, the terminal may further comprise an input-output device 207.
The memory 203 may be configured to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for alarming intrusion behavior in the embodiment of the present application, and the processor 201 executes various functional applications and data processing by running the software programs and modules stored in the memory 203, that is, implements the method for alarming intrusion behavior described above. The memory 203 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 203 may further include memory located remotely from the processor 201, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 205 is used for receiving or sending data via a network, and can also be used for data transmission between a processor and a memory. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 205 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices to communicate with the internet or a local area Network. In one example, the transmission device 205 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Wherein the memory 203 is specifically used for storing application programs.
The processor 201 may call the application stored in the memory 203 via the transmission means 205 to perform the following steps:
detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting an object invading the target area;
and sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
The processor 201 is further configured to perform the following steps:
determining whether the moving object belongs to a target type of creature;
in the event that it is determined that the moving object belongs to the target type of creature, determining whether the moving object belongs to an object in a set of objects, wherein the set of objects is a set of objects allowed to enter the target area;
in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object;
determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
It can be understood by those skilled in the art that the structure shown in fig. 5 is only an illustration, and the terminal may be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, etc. Fig. 5 is a diagram illustrating a structure of the electronic device. For example, the terminal may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 5, or have a different configuration than shown in FIG. 5.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Embodiments of the present application also provide a storage medium. Alternatively, in this embodiment, the storage medium may be a program code for executing an alarm method for intrusion behavior.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting an object invading the target area;
and sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
determining whether the moving object belongs to a target type of creature;
in the event that it is determined that the moving object belongs to the target type of creature, determining whether the moving object belongs to an object in a set of objects, wherein the set of objects is a set of objects allowed to enter the target area;
in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object;
determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. An alarm method for intrusion behavior, comprising:
detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting an object invading the target area;
and sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
2. The method of claim 1, further comprising determining whether the active object belongs to a trusted object by:
determining whether the moving object belongs to a target type of creature;
in the event that it is determined that the moving object belongs to the target type of creature, determining whether the moving object belongs to an object in a set of objects, wherein the set of objects is a set of objects allowed to enter the target area;
in an instance in which it is determined that the active object does not belong to the set of objects, determining that the active object does not belong to a trusted object;
determining that the active object belongs to a trusted object if it is determined that the active object does not belong to a living being of the target type or if it is determined that the active object belongs to a living being of the target type and belongs to the set of objects.
3. The method of claim 2, wherein determining whether the moving object belongs to a target type of creature comprises:
and distinguishing whether the moving object is a living being belonging to a target type according to the moving distance between the targets and the Doppler frequency shift information by using a first classifier, wherein the living being of the target type comprises a human being.
4. The method of claim 2, wherein determining whether the active object belongs to an object in a set of objects comprises:
and utilizing a second classifier to determine whether the moving object belongs to the objects in the object set by comparing the characteristic information formed by the distance and the Doppler frequency shift when the different body part motions of the human body of the moving object are combined with the characteristic information of the objects in the object set.
5. The method of claim 4, wherein prior to determining whether the active object belongs to an object in a set of objects, the method further comprises:
when the object in the object set moves, acquiring and storing characteristic information formed by the distance and Doppler shift when different body part motions of the object are combined.
6. The method of claim 2, wherein prior to determining that the active object does not belong to a trusted object, the method further comprises:
determining whether a guest record configured for the target area exists;
wherein the active object is determined not to belong to a trusted object if it is determined that there is no guest record configured for the target area.
7. The method of any one of claims 1 to 6, wherein detecting a moving object in a target area by millimeter wave radar comprises:
transmitting radar signals by using the millimeter wave radar, and receiving reflected point cloud signals;
determining that the moving object is detected in the target area in a case where the number of point cloud signals is greater than a set threshold value.
8. An intrusion alert device comprising:
the detection unit is used for detecting a moving object in a target area through a millimeter wave radar, wherein the millimeter wave radar is used for detecting the object invading the target area;
and the alarm unit is used for sending alarm information under the condition that the movable object does not belong to a credible object, wherein the alarm information is used for indicating that an object invading the target area exists.
9. A storage medium, characterized in that the storage medium comprises a stored program, wherein the program when executed performs the method of any of the preceding claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the method of any of the preceding claims 1 to 7 by means of the computer program.
CN202011348141.4A 2020-11-26 2020-11-26 Intrusion behavior alarm method and device, storage medium and electronic device Pending CN112396791A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011348141.4A CN112396791A (en) 2020-11-26 2020-11-26 Intrusion behavior alarm method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011348141.4A CN112396791A (en) 2020-11-26 2020-11-26 Intrusion behavior alarm method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN112396791A true CN112396791A (en) 2021-02-23

Family

ID=74605300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011348141.4A Pending CN112396791A (en) 2020-11-26 2020-11-26 Intrusion behavior alarm method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN112396791A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112896096A (en) * 2021-03-04 2021-06-04 森思泰克河北科技有限公司 Anti-theft alarm method, device and terminal for automobile
CN113537035A (en) * 2021-07-12 2021-10-22 宁波溪棠信息科技有限公司 Human body target detection method, human body target detection device, electronic device and storage medium
CN114047503A (en) * 2021-11-03 2022-02-15 珠海格力电器股份有限公司 Moving object detection method and device, electronic equipment and storage medium
WO2024138369A1 (en) * 2022-12-27 2024-07-04 华为技术有限公司 Target recognition method, related apparatus and terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3134813A1 (en) * 1981-09-03 1983-03-17 Vilém 8000 München Klir Microwave anti-shoplifting system
CN110058220A (en) * 2019-05-05 2019-07-26 广东勘生科技有限公司 Fire detection rescue mode and system based on millimetre-wave radar technology
CN110488264A (en) * 2019-07-05 2019-11-22 珠海格力电器股份有限公司 Personnel's detection method, device, electronic equipment and storage medium
CN110689654A (en) * 2019-09-17 2020-01-14 厦门朗畅信息技术有限公司 Apartment security system
CN111127800A (en) * 2019-11-12 2020-05-08 西安电子科技大学青岛计算技术研究院 Real-time alarm method for regional intrusion based on combination of millimeter wave radar and alarm
CN111693986A (en) * 2019-03-11 2020-09-22 杭州海康威视数字技术股份有限公司 Target object intrusion detection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3134813A1 (en) * 1981-09-03 1983-03-17 Vilém 8000 München Klir Microwave anti-shoplifting system
CN111693986A (en) * 2019-03-11 2020-09-22 杭州海康威视数字技术股份有限公司 Target object intrusion detection system
CN110058220A (en) * 2019-05-05 2019-07-26 广东勘生科技有限公司 Fire detection rescue mode and system based on millimetre-wave radar technology
CN110488264A (en) * 2019-07-05 2019-11-22 珠海格力电器股份有限公司 Personnel's detection method, device, electronic equipment and storage medium
CN110689654A (en) * 2019-09-17 2020-01-14 厦门朗畅信息技术有限公司 Apartment security system
CN111127800A (en) * 2019-11-12 2020-05-08 西安电子科技大学青岛计算技术研究院 Real-time alarm method for regional intrusion based on combination of millimeter wave radar and alarm

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112896096A (en) * 2021-03-04 2021-06-04 森思泰克河北科技有限公司 Anti-theft alarm method, device and terminal for automobile
CN112896096B (en) * 2021-03-04 2022-07-29 森思泰克河北科技有限公司 Anti-theft alarm method, device and terminal for automobile
CN113537035A (en) * 2021-07-12 2021-10-22 宁波溪棠信息科技有限公司 Human body target detection method, human body target detection device, electronic device and storage medium
CN114047503A (en) * 2021-11-03 2022-02-15 珠海格力电器股份有限公司 Moving object detection method and device, electronic equipment and storage medium
WO2024138369A1 (en) * 2022-12-27 2024-07-04 华为技术有限公司 Target recognition method, related apparatus and terminal

Similar Documents

Publication Publication Date Title
CN112396791A (en) Intrusion behavior alarm method and device, storage medium and electronic device
CN109765539B (en) Indoor user behavior monitoring method and device, electrical equipment and home monitoring system
US11196966B2 (en) Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects
US20170039455A1 (en) Computer-vision based security system using a depth camera
CN112418069A (en) High-altitude parabolic detection method and device, computer equipment and storage medium
CN110070155B (en) Comprehensive behavior recognition method and system for prisoner based on wearable equipment
CN112184626A (en) Gesture recognition method, device, equipment and computer readable medium
US11631306B2 (en) Methods and system for monitoring an environment
US8098186B2 (en) Through-the-obstacle radar system and method of operation
CN112184642A (en) Method and device for warning abnormal sleeping posture, storage medium and electronic device
CN109996037A (en) A kind of method for safety monitoring in waters, device, equipment and system
US11200793B2 (en) Notifications for camera tampering
CN103632479A (en) Home-based care for the aged security and protection system based on human motion trajectory analysis
CN113723369B (en) Control method, control device, electronic equipment and storage medium
Chang et al. Video surveillance for hazardous conditions using sensor networks
US20200349241A1 (en) Machine learning-based anomaly detection for human presence verification
US11922642B1 (en) Methods and apparatus for detecting unrecognized moving objects
Jeevitha et al. A study on sensor based animal intrusion alert system using image processing techniques
CN114338585A (en) Message pushing method and device, storage medium and electronic device
CN115052338A (en) Intelligent household home security system based on remote alarm
US20230237889A1 (en) Detecting an object in an environment
Ushasree et al. Intrusion Detection System using Machine Learning and Microwave Doppler Radar
CN103607577A (en) Aged-care at home and security and protection system based on body motion trail analysis
CN116740874A (en) Intrusion detection method and related device
Alkhathami et al. Model and Techniques Analysis of Border Intrusion Detection Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination