CN112396801A - Monitoring alarm method, monitoring alarm device and storage medium - Google Patents

Monitoring alarm method, monitoring alarm device and storage medium Download PDF

Info

Publication number
CN112396801A
CN112396801A CN202011282087.8A CN202011282087A CN112396801A CN 112396801 A CN112396801 A CN 112396801A CN 202011282087 A CN202011282087 A CN 202011282087A CN 112396801 A CN112396801 A CN 112396801A
Authority
CN
China
Prior art keywords
alarm
monitoring
monitoring alarm
server
audio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011282087.8A
Other languages
Chinese (zh)
Inventor
陶勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AI Speech Ltd
Original Assignee
AI Speech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AI Speech Ltd filed Critical AI Speech Ltd
Priority to CN202011282087.8A priority Critical patent/CN112396801A/en
Publication of CN112396801A publication Critical patent/CN112396801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D3/00Control of position or direction
    • G05D3/12Control of position or direction using feedback
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0492Sensor dual technology, i.e. two or more technologies collaborate to extract unsafe condition, e.g. video tracking and RFID tracking
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • G08B29/188Data fusion; cooperative systems, e.g. voting among different detectors

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Emergency Management (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Child & Adolescent Psychology (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a monitoring alarm method, which is applied to a monitoring alarm device and comprises the following steps: collecting audio data and image data through the monitoring alarm device; when the audio data contains audio alarm characteristic information, further analyzing the image data to determine whether the current scene meets an alarm condition; and alarming when the current scene meets the alarm condition. The invention avoids false triggering of alarm by simultaneously considering the audio alarm characteristic information and the image alarm characteristic information as the judgment condition for judging whether to alarm or not.

Description

Monitoring alarm method, monitoring alarm device and storage medium
Technical Field
The present invention relates to the field of electronic information technologies, and in particular, to a monitoring alarm method, a monitoring alarm device, and a storage medium.
Background
The existing monitoring and alarming devices usually have devices based on voice control and detection or devices based on image acquisition and analysis. For example, the intelligent sound box can realize alarm monitoring by monitoring voice; the network camera can carry out alarm monitoring through image acquisition and analysis.
However, in the process of implementing the present invention, the inventor finds that in the prior art, since only one factor (voice or image) is adopted as a factor for judging whether to alarm, false alarm is often caused for a specific scene.
Disclosure of Invention
The embodiment of the invention provides a monitoring alarm method, a monitoring alarm device and a storage medium, which are used for solving at least one of the technical problems.
In a first aspect, an embodiment of the present invention provides a monitoring and alarming method, which is applied to a monitoring and alarming device, and includes: collecting audio data and image data through the monitoring alarm device; when the audio data contains audio alarm characteristic information, further analyzing the image data to determine whether the current scene meets an alarm condition; and alarming when the current scene meets the alarm condition.
In a second aspect, an embodiment of the present invention provides a storage medium, in which one or more programs including execution instructions are stored, where the execution instructions can be read and executed by a monitoring alarm apparatus (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the monitoring alarm methods of the present invention.
In a third aspect, a monitoring alarm device is provided, which includes: the monitoring system comprises at least one processor and a memory which is in communication connection with the at least one processor, wherein the memory stores instructions which can be executed by the at least one processor, and the instructions are executed by the at least one processor so as to enable the at least one processor to execute any monitoring alarm method.
In a fourth aspect, the present invention further provides a computer program product, which includes a computer program stored on a storage medium, the computer program including program instructions, which when executed by a computer, cause the computer to perform any one of the monitoring alarm methods described above.
The embodiment of the invention has the beneficial effects that: by simultaneously considering the audio alarm characteristic information and the image alarm characteristic information as the judgment condition for judging whether to alarm or not, the false triggering of alarm is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of a monitoring alarm method of the present invention;
FIG. 2 is a flow chart of another embodiment of a monitoring alarm method of the present invention;
FIG. 3 is a flow chart of another embodiment of a monitoring alarm method of the present invention;
FIG. 4 is a flow chart of another embodiment of a monitoring alarm method of the present invention;
FIG. 5 is a flow chart of another embodiment of a monitoring alarm method of the present invention;
FIG. 6 is a flow chart of another embodiment of a monitoring alarm method of the present invention;
fig. 7 is a schematic structural diagram of an embodiment of the monitoring alarm device of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As used in this disclosure, "module," "device," "system," and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. In particular, for example, an element may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. Also, an application or script running on a server, or a server, may be an element. One or more elements may be in a process and/or thread of execution and an element may be localized on one computer and/or distributed between two or more computers and may be operated by various computer-readable media. The elements may also communicate by way of local and/or remote processes based on a signal having one or more data packets, e.g., from a data packet interacting with another element in a local system, distributed system, and/or across a network in the internet with other systems by way of the signal.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The invention provides a monitoring alarm method which is used for a monitoring alarm device, wherein the monitoring alarm device can be an electronic device with an image function and an audio acquisition function. For example, the monitoring and alarm device may be a smart camera configured with an audio acquisition module comprising an array of microphones.
As shown in fig. 1, an embodiment of the present invention provides a monitoring alarm method, which is applied to a monitoring alarm device, and the method includes:
and S10, acquiring audio data and image data through the monitoring alarm device.
Illustratively, the image data is acquired by a camera of the monitoring alarm device, and the audio data is acquired by an audio acquisition module of the monitoring alarm device.
And S20, when the audio data contains the audio alarm characteristic information, further analyzing the image data to determine whether the current scene meets the alarm condition.
Illustratively, the audio alert characteristic information includes: voice information and/or dynamic and static information are preset. The preset voice information includes preset alarm keywords (for example, "rescue", "alarm", and the like), and the preset sound and static information includes a tumbling sound and an explosion sound.
And S30, alarming when the current scene meets the alarm condition. Illustratively, when the current scene meets the alarm condition, a preset alarm telephone is dialed for alarming.
The embodiment of the invention can avoid false triggering of alarm by simultaneously considering the audio alarm characteristic information and the image alarm characteristic information as the judgment condition for judging whether to alarm or not. For example, in a home environment, when a child is playing an alarm, the child may yell "life saving", which is an audio alarm feature, and if only an alarm is made accordingly at that time, a false alarm may result. The method of the invention can further analyze the image data to determine the scene that the current scene is played by children and does not accord with the alarm condition, thereby avoiding false alarm.
As shown in fig. 2, it is a flowchart of another embodiment of the monitoring alarm method of the present invention, in this embodiment, the monitoring alarm apparatus monitors images and voices simultaneously, obtains behavior analysis results through an image analysis technique, obtains voice recognition results through a voice recognition technique, and makes a judgment by comprehensively analyzing the two results. And if the abnormal condition exists, judging whether the alarm is needed, for example, if the voice recognition result is 'life saving', and the image behavior analysis result is fighting or holding, determining that the alarm is needed. If the alarm is not needed, whether a medical rescue call needs to be dialed is judged, for example, the voice recognition result is 'life saving', and the image behavior analysis result is that the householder falls on the ground. And if the specific type of the abnormity can not be judged, sending a short message to the emergency contact.
As shown in fig. 3, it is a flowchart of another embodiment of the monitoring alarm method of the present invention, in this embodiment, acquiring audio data and image data by the monitoring alarm device includes:
and S11, acquiring audio data through the monitoring alarm device.
Illustratively, the audio data is obtained by an audio acquisition module of the monitoring and alarm device. For example, an array of microphones monitoring the alarm device is used to collect audio data.
And S12, positioning the sound source according to the audio data to determine the sound source direction.
Illustratively, a sound source localization algorithm is employed to determine the direction from which sound is emitted based on the acquired audio data in order to control the monitoring and warning device to turn to that direction to acquire image data of that direction.
And S13, controlling the monitoring alarm device to acquire the image data of the sound source direction.
Illustratively, after the sound source direction is determined, the camera of the monitoring alarm device is controlled to turn to the sound source direction.
According to the embodiment of the invention, the voice processing and image processing technologies are combined, so that the monitoring alarm device (such as a household anti-theft camera) can accurately track and record a video of a target and accurately judge the current situation to make a proper response, criminal behaviors can be prevented in advance, related rescue is carried out, and a user is protected more effectively.
As shown in fig. 4, which is a flowchart of another embodiment of the monitoring alarm method of the present invention, in this embodiment, when there is no target in the monitoring range of the camera of the monitoring alarm device, the voice positioning function is turned on, the microphone array starts to pick up sound, the recorded audio is sent to the neural network for discrimination, if the sound is abnormal sound such as human sound or turning cabinet, the audio is further subjected to sound source positioning, and an angle adjustment instruction is sent to the monitoring alarm device according to the direction given by the sound source positioning, so as to complete the monitoring angle adjustment of the camera. If the recorded audio is not the voice or the abnormal sound such as turning over the box and turning over the cabinet, the sound pickup process is returned again, and a new round of voice processing is started.
As shown in fig. 5, it is a flowchart of another embodiment of the monitoring alarm method of the present invention, and in this embodiment, the method further includes:
and S40, when the audio data does not contain audio alarm characteristic information, further analyzing the image data to determine whether the current scene meets the alarm condition.
And S50, if the current scene is determined to meet the alarm condition, sending pre-alarm information to the server for indicating the server to alarm after the preset time.
Illustratively, the current scenario may be a householder fall scenario. For the older householder, when the householder falls down, the calling for help such as 'life saving' is not actually sent out, and the audio data collected by the monitoring alarm device does not contain the audio alarm characteristic information, so that whether the current scene meets the alarm condition is further determined by analyzing the collected image data in the situation.
Illustratively, the pre-alarm information includes a preset time for the server to alarm if no indication of no alarm is received within the preset time after the server receives the pre-alarm information. For example, the server dials an alarm phone to alarm.
In this embodiment, when it is determined that the current scene meets the alarm condition, an alarm is not directly given, but pre-alarm information is generated and sent to the server, and when the preset time is exceeded and no opposite instruction is received, the server automatically gives an alarm, so that on one hand, false alarm can be avoided, and on the other hand, the situation that the alarm cannot be given due to the failure of the monitoring alarm device (for example, a thief considers to be damaged) can be avoided.
As shown in fig. 6, it is a flowchart of another embodiment of the monitoring alarm method of the present invention, and in this embodiment, the method further includes:
and S60, sending the pre-alarm information to the server and simultaneously confirming whether to alarm or not to the user. Illustratively, the monitoring alarm device confirms whether to alarm or not to the user in a voice broadcast mode while sending the pre-alarm information to the server. For example, a monitoring alarm announces "is a host asking if you need to help you give an alarm? "
And S70, if the user confirms that the alarm is not given in the preset time, sending a control instruction of not giving the alarm to the server.
In the embodiment, the pre-alarm information is generated and sent to the server when the current scene is determined to be in accordance with the alarm condition, whether the alarm is given or not is confirmed to the user, and if the user confirms that the alarm is not given in the preset time, the control instruction without the alarm is sent to the server, so that false alarm is avoided.
The inventor finds that the monitoring alarm device confirms whether to alarm or not to a user in a voice broadcast mode in the process of implementing the invention, if a thief is in the field, the monitoring alarm device can be damaged violently, so that the communication between the monitoring alarm device and the server is disconnected, and the alarm cannot be given. The inventor further improves the monitoring and alarming method of the invention aiming at the situation.
In some embodiments, a long connection is maintained between the monitoring alarm device and the server by adopting a heartbeat mechanism, so that the server is triggered to alarm when the long connection is disconnected within the preset time.
In this embodiment, the long connection between the monitoring alarm device and the server is maintained through a heartbeat mechanism, so that the monitoring of the monitoring alarm device by the server is realized. After the monitoring alarm device confirms whether to give an alarm to a user in a voice broadcasting mode, the server cannot monitor the heartbeat packet of the monitoring alarm device, and the monitoring alarm device can be determined to be damaged by a thief, so that the server can give an alarm immediately.
It should be noted that for simplicity of explanation, the foregoing method embodiments are described as a series of acts or combination of acts, but those skilled in the art will appreciate that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention. In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In some embodiments, the present invention provides a non-volatile computer readable storage medium, in which one or more programs including executable instructions are stored, and the executable instructions can be read and executed by a monitoring alarm apparatus (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the monitoring alarm methods of the present invention.
In some embodiments, the present invention further provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform any of the monitoring alarm methods described above.
In some embodiments, an embodiment of the present invention further provides a monitoring alarm device, which includes: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a monitoring alarm method.
In some embodiments, the present invention further provides a storage medium having a computer program stored thereon, wherein the computer program is configured to implement a monitoring alarm method when executed by a processor.
Fig. 7 is a schematic diagram of a hardware structure of a monitoring alarm apparatus for executing a monitoring alarm method according to another embodiment of the present application, and as shown in fig. 7, the apparatus includes:
one or more processors 710 and a memory 720, one processor 710 being illustrated in fig. 7.
The apparatus for performing the monitoring alarm method may further include: an input device 730 and an output device 740.
The processor 710, the memory 720, the input device 730, and the output device 740 may be connected by a bus or other means, such as the bus connection in fig. 7.
The memory 720, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the monitoring alarm method in the embodiments of the present application. The processor 710 executes various functional applications and data processing of the server by executing nonvolatile software programs, instructions and modules stored in the memory 720, so as to implement the monitoring and alarming method of the above method embodiment.
The memory 720 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from use of the monitoring alarm device, and the like. Further, the memory 720 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 720 optionally includes memory located remotely from processor 710, and such remote memory may be connected to the monitoring alarm device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 730 may receive entered numeric or character information and generate signals related to user settings and function controls of the monitoring and alarm device. The output device 740 may include a display device such as a display screen.
The one or more modules are stored in the memory 720 and, when executed by the one or more processors 710, perform the monitoring alarm method of any of the method embodiments described above.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
The monitoring alarm device of the embodiment of the application exists in various forms, including but not limited to:
(1) intelligent camera, intelligent audio amplifier etc..
(2) A mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(3) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(4) A portable entertainment device: such devices can display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(5) And other electronic devices with data interaction functions.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A monitoring alarm method is applied to a monitoring alarm device, and comprises the following steps:
collecting audio data and image data through the monitoring alarm device;
when the audio data contains audio alarm characteristic information, further analyzing the image data to determine whether the current scene meets an alarm condition;
and alarming when the current scene meets the alarm condition.
2. The method of claim 1, wherein the capturing audio data and image data by the monitoring and warning device comprises:
collecting audio data through the monitoring alarm device;
carrying out sound source positioning according to the audio data to determine a sound source direction;
and controlling the monitoring alarm device to acquire the image data of the sound source direction.
3. The method of claim 1, wherein the audio alert characteristic information comprises: voice information and/or dynamic and static information are preset.
4. The method of claim 3, wherein the preset voice information comprises a preset alarm keyword, and the preset sound and static information comprises a tumbling sound and an explosion sound.
5. The method of claim 1, wherein alerting when the current scene meets an alert condition comprises: and when the current scene meets the alarm condition, dialing a preset alarm telephone to alarm.
6. The method of claim 1, further comprising:
when the audio data does not contain audio alarm characteristic information, further analyzing the image data to determine whether the current scene meets an alarm condition;
and if the current scene is determined to be in accordance with the alarm condition, sending pre-alarm information to a server for indicating the server to alarm after preset time.
7. The method of claim 6, further comprising: when the pre-alarm information is sent to the server, whether an alarm is given or not is confirmed to the user;
and if the user confirms that the alarm is not given in the preset time, sending a control instruction for not giving the alarm to the server.
8. The method according to claim 7, wherein a long connection is maintained between the monitoring alarm device and the server by adopting a heartbeat mechanism, so that the long connection is disconnected within the preset time to trigger the server to alarm.
9. A monitoring alarm device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 1-8.
10. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN202011282087.8A 2020-11-16 2020-11-16 Monitoring alarm method, monitoring alarm device and storage medium Pending CN112396801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011282087.8A CN112396801A (en) 2020-11-16 2020-11-16 Monitoring alarm method, monitoring alarm device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011282087.8A CN112396801A (en) 2020-11-16 2020-11-16 Monitoring alarm method, monitoring alarm device and storage medium

Publications (1)

Publication Number Publication Date
CN112396801A true CN112396801A (en) 2021-02-23

Family

ID=74599631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011282087.8A Pending CN112396801A (en) 2020-11-16 2020-11-16 Monitoring alarm method, monitoring alarm device and storage medium

Country Status (1)

Country Link
CN (1) CN112396801A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114246526A (en) * 2021-12-31 2022-03-29 思必驰科技股份有限公司 Sweeping robot control method, electronic device and storage medium
CN114710759A (en) * 2022-04-21 2022-07-05 北京博识广联科技有限公司 Base station communication method and device in field scene

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004357014A (en) * 2003-05-29 2004-12-16 Matsushita Electric Works Ltd Monitor report system
CN101501564A (en) * 2006-08-03 2009-08-05 国际商业机器公司 Video surveillance system and method with combined video and audio recognition
CN103903406A (en) * 2012-12-30 2014-07-02 王方淇 Emergency monitoring and notifying method and system
CN104036617A (en) * 2014-06-11 2014-09-10 广东安居宝数码科技股份有限公司 Method and system for alarming
CN104243894A (en) * 2013-06-09 2014-12-24 中国科学院声学研究所 Audio and video fused monitoring method
CN204990647U (en) * 2015-04-27 2016-01-20 李应桐 City safety warning positioning system
CN107437063A (en) * 2017-07-04 2017-12-05 上海小蚁科技有限公司 For sensing apparatus and method, the non-transitory computer-readable medium of environment
CN109672853A (en) * 2018-09-25 2019-04-23 深圳壹账通智能科技有限公司 Method for early warning, device, equipment and computer storage medium based on video monitoring
US20200007357A1 (en) * 2019-08-02 2020-01-02 Lg Electronics Inc. Apparatus and method for smart home monitoring
CN111583580A (en) * 2019-02-18 2020-08-25 奇酷互联网络科技(深圳)有限公司 Sound-based alarm method, intelligent terminal and device with storage function
CN111601074A (en) * 2020-04-24 2020-08-28 平安科技(深圳)有限公司 Security monitoring method and device, robot and storage medium
CN111866454A (en) * 2020-07-02 2020-10-30 广州博冠智能科技有限公司 Sound and image linkage detection early warning method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004357014A (en) * 2003-05-29 2004-12-16 Matsushita Electric Works Ltd Monitor report system
CN101501564A (en) * 2006-08-03 2009-08-05 国际商业机器公司 Video surveillance system and method with combined video and audio recognition
CN103903406A (en) * 2012-12-30 2014-07-02 王方淇 Emergency monitoring and notifying method and system
CN104243894A (en) * 2013-06-09 2014-12-24 中国科学院声学研究所 Audio and video fused monitoring method
CN104036617A (en) * 2014-06-11 2014-09-10 广东安居宝数码科技股份有限公司 Method and system for alarming
CN204990647U (en) * 2015-04-27 2016-01-20 李应桐 City safety warning positioning system
CN107437063A (en) * 2017-07-04 2017-12-05 上海小蚁科技有限公司 For sensing apparatus and method, the non-transitory computer-readable medium of environment
CN109672853A (en) * 2018-09-25 2019-04-23 深圳壹账通智能科技有限公司 Method for early warning, device, equipment and computer storage medium based on video monitoring
CN111583580A (en) * 2019-02-18 2020-08-25 奇酷互联网络科技(深圳)有限公司 Sound-based alarm method, intelligent terminal and device with storage function
US20200007357A1 (en) * 2019-08-02 2020-01-02 Lg Electronics Inc. Apparatus and method for smart home monitoring
CN111601074A (en) * 2020-04-24 2020-08-28 平安科技(深圳)有限公司 Security monitoring method and device, robot and storage medium
CN111866454A (en) * 2020-07-02 2020-10-30 广州博冠智能科技有限公司 Sound and image linkage detection early warning method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国科协青少年科技中心, 科学普及出版社 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114246526A (en) * 2021-12-31 2022-03-29 思必驰科技股份有限公司 Sweeping robot control method, electronic device and storage medium
CN114710759A (en) * 2022-04-21 2022-07-05 北京博识广联科技有限公司 Base station communication method and device in field scene
CN114710759B (en) * 2022-04-21 2024-03-08 北京博识广联科技有限公司 Base station communication method and device in field scene

Similar Documents

Publication Publication Date Title
US20170163580A1 (en) Interactive method and device for playback of multimedia
CN109616125A (en) Monitoring method and system based on Application on Voiceprint Recognition
CN112396801A (en) Monitoring alarm method, monitoring alarm device and storage medium
CN105701997A (en) Alarm method and device
CN104994335A (en) Alarm method and terminal
CN108124042B (en) Device fault detection method and device and mobile terminal
CN110166789B (en) Method for monitoring video live broadcast sensitive information, computer equipment and readable storage medium
KR20220057213A (en) System for detecting abnormal behavior based on artificial intelligence
CN113010139B (en) Screen projection method and device and electronic equipment
CN112017323A (en) Patrol alarm method and device, readable storage medium and terminal equipment
JP2006331388A (en) Crime prevention system
CN104378596B (en) A kind of method and device carrying out distance communicating with picture pick-up device
CN111653067A (en) Intelligent household equipment and alarm method based on audio frequency
US20180084228A1 (en) Low-fidelity always-on audio/video monitoring
CN111698529B (en) Live broadcast monitoring method, device, equipment and computer readable storage medium
CN105934933B (en) Method for preventing terminal from being lost and terminal
CN117218787A (en) Fire alarm method, device, electronic equipment and storage medium
CN111179532A (en) Monitoring method and monitoring equipment
CN112153324A (en) Monitoring video display method, device and system
CN213042656U (en) Information processing apparatus
CN112383827B (en) Video playing control method and device
CN107124649A (en) The control method and device of Intelligent set top box
CN112580390B (en) Security monitoring method and device based on intelligent sound box, sound box and medium
JP2005107895A (en) Security system and security method
JP2002312860A (en) Abnormal state confirming device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant after: Sipic Technology Co.,Ltd.

Address before: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant before: AI SPEECH Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223

RJ01 Rejection of invention patent application after publication