CN112788288A - Safety monitoring method, system, equipment and medium based on mobile terminal - Google Patents

Safety monitoring method, system, equipment and medium based on mobile terminal Download PDF

Info

Publication number
CN112788288A
CN112788288A CN202011502242.2A CN202011502242A CN112788288A CN 112788288 A CN112788288 A CN 112788288A CN 202011502242 A CN202011502242 A CN 202011502242A CN 112788288 A CN112788288 A CN 112788288A
Authority
CN
China
Prior art keywords
mobile terminal
preset
distance
security monitoring
detection device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011502242.2A
Other languages
Chinese (zh)
Inventor
贾秋玉
苏婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Tianjin Co Ltd
Original Assignee
Spreadtrum Communications Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Tianjin Co Ltd filed Critical Spreadtrum Communications Tianjin Co Ltd
Priority to CN202011502242.2A priority Critical patent/CN112788288A/en
Publication of CN112788288A publication Critical patent/CN112788288A/en
Priority to PCT/CN2021/135239 priority patent/WO2022127614A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Abstract

The invention discloses a safety monitoring method, a system, equipment and a medium based on a mobile terminal, wherein the method comprises the following steps: judging whether the distance between the mobile terminal and the detection device is within a first preset distance range or not, wherein the detection device is positioned in a preset space; if so, starting a first contextual model of the mobile terminal; detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model; and if other mobile terminals with the distances smaller than the first preset threshold exist, giving an alarm. According to the invention, the mobile terminal entering the preset space is controlled to open the first contextual model to obtain the distance between the mobile terminal and other mobile terminals, and an alarm is given when the distance exceeds the preset threshold value, so that the personnel in the preset space can be monitored, and the safety of the personnel in the preset space is ensured.

Description

Safety monitoring method, system, equipment and medium based on mobile terminal
Technical Field
The present invention relates to the field of monitoring, and in particular, to a security monitoring method, system, device, and medium based on a mobile terminal.
Background
The conference development is an inevitable employee activity of a company, and is convenient for guiding matters, collective discussion, brainstorming and the like. In some special periods, people need to participate in the meeting, so that direct contact is reduced as much as possible, and the total amount and distribution of people in one area are controlled. The prior art lacks a technology for monitoring personnel and distribution in a specific area, so that the safety of the personnel in the specific area cannot be ensured.
Disclosure of Invention
The invention provides a safety monitoring method, a system, equipment and a medium based on a mobile terminal, aiming at overcoming the defect that the safety of personnel in a specific area cannot be ensured because the personnel and distribution in the specific area cannot be monitored in the prior art.
The invention solves the technical problems through the following technical scheme:
a safety monitoring method based on a mobile terminal comprises the following steps:
judging whether the distance between the mobile terminal and a detection device is within a first preset distance range or not, wherein the detection device is positioned in a preset space;
if so, starting a first contextual model of the mobile terminal;
detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model;
and if other mobile terminals with the distances smaller than the first preset threshold exist, giving an alarm.
Preferably, the security monitoring method further includes:
counting the number of the mobile terminals within a second preset distance range from the detection device;
and if the number exceeds a second preset threshold value, sending out an alarm.
Preferably, the number of the detection devices is multiple;
the step of judging whether the distance between the mobile terminal and the detection device is within a first preset distance range specifically comprises:
and judging whether the distance between the mobile terminal and any one of the detection devices is within a first preset distance range.
Preferably, the security monitoring method further includes:
each mobile terminal corresponds to a unique number;
acquiring the serial numbers of all the mobile terminals in the first preset distance range corresponding to each detection device;
and summarizing the obtained serial numbers of all the mobile terminals, removing repeated parts to count the number of the mobile terminals in the preset space, and giving an alarm when the number exceeds a third preset threshold value.
Preferably, the security monitoring method further includes:
presetting a corresponding relation between the serial number of the mobile terminal and personnel;
and determining the personnel information corresponding to the mobile terminal according to the serial number and the corresponding relation.
Preferably, the step of detecting the distance between the mobile terminal and the other mobile terminals that start the first contextual model specifically includes:
acquiring all other mobile terminals within a third preset distance range from the mobile terminal;
detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model;
and/or the presence of a gas in the gas,
the security monitoring method further comprises:
recording a time moving line of the mobile terminal, a first time corresponding to the mobile terminal entering the preset space and a second time corresponding to the mobile terminal leaving the preset space.
Preferably, the security monitoring method further includes:
if the distance between the mobile terminal and the detection device is judged to be within a first preset distance range, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range again after preset time, and starting a first contextual model of the mobile terminal when the distance between the mobile terminal and the detection device is judged to be within the first preset distance range again;
and/or the presence of a gas in the gas,
if the distance between the mobile terminal and the detection device is judged to be within a first preset distance range, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range for multiple times within preset time, and starting the first contextual model of the mobile terminal when the judgment is yes.
A security monitoring system based on a mobile terminal comprises:
the distance judging module is used for judging whether the distance between the mobile terminal and the detecting device is within a first preset distance range or not, wherein the detecting device is positioned in a preset space;
if yes, calling a mode starting module;
the mode starting module is used for starting a first contextual mode of the mobile terminal;
the distance detection module is used for detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model;
and the first alarm module is used for sending out an alarm if other mobile terminals with the distances smaller than a first preset threshold exist.
Preferably, the security monitoring system further comprises:
the quantity counting module is used for counting the quantity of the mobile terminals within a second preset distance range from the detection device;
and the second alarm module is used for sending out an alarm if the number exceeds a second preset threshold value.
Preferably, the number of the detection devices is multiple;
the distance judging module is used for judging whether the distance between the mobile terminal and any one of the detecting devices is within a first preset distance range.
Preferably, the security monitoring system further comprises:
each mobile terminal corresponds to a unique number;
the quantity counting module specifically comprises:
a number obtaining unit, configured to obtain numbers of all the mobile terminals within the first preset distance range corresponding to each detection device;
and the counting alarm unit is used for collecting the obtained serial numbers of all the mobile terminals, removing repeated parts to count the number of the mobile terminals in the preset space, and giving an alarm when the number exceeds a third preset threshold value.
Preferably, the security monitoring system further comprises:
the preset module is used for presetting the corresponding relation between the serial number of the mobile terminal and personnel;
and the personnel determining module is used for determining the personnel information corresponding to the mobile terminal according to the serial number and the corresponding relation.
Preferably, the distance detection module specifically includes:
the acquisition unit is used for acquiring all other mobile terminals within a third preset distance range from the mobile terminal;
a distance detection unit, configured to detect a distance between the mobile terminal and another mobile terminal that starts the first contextual model;
and/or the presence of a gas in the gas,
the security monitoring system further comprises:
the recording module is used for recording a time line of the mobile terminal, a first time corresponding to the mobile terminal entering the preset space and a second time corresponding to the mobile terminal leaving the preset space.
Preferably, the security monitoring system further comprises:
the first mode starting module is used for judging whether the distance between the mobile terminal and the detection device is within a first preset distance range again after preset time after judging that the distance between the mobile terminal and the detection device is within the first preset distance range, and starting a first contextual mode of the mobile terminal only when the distance between the mobile terminal and the detection device is judged to be within the first preset distance range again;
and/or the presence of a gas in the gas,
and the second mode starting module is used for judging whether the distance between the mobile terminal and the detection device is within a first preset distance range for multiple times within preset time after judging that the distance between the mobile terminal and the detection device is within the first preset distance range, and starting the first contextual mode of the mobile terminal when the judgment is yes.
An electronic device includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the mobile terminal-based security monitoring method according to any one of the above items when executing the computer program.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the mobile terminal-based security monitoring method of any of the above.
The positive progress effects of the invention are as follows: according to the invention, the mobile terminal entering the preset space is controlled to open the first contextual model and obtain the distance to other mobile terminals, and an alarm is given when the distance between the mobile terminals exceeds the preset threshold value, so that the safety distance between personnel in the preset space can be ensured, the safety monitoring of the personnel in the preset space is realized, and the safety of the personnel in the preset space is ensured.
Drawings
Fig. 1 is a flowchart of a security monitoring method based on a mobile terminal according to embodiment 1 of the present invention.
Fig. 2 is a partial flowchart of a security monitoring method based on a mobile terminal according to embodiment 2 of the present invention.
Fig. 3 is a flowchart of another security monitoring method based on a mobile terminal according to embodiment 2 of the present invention.
Fig. 4 is a schematic structural diagram of a security monitoring system based on a mobile terminal according to embodiment 3 of the present invention.
Fig. 5 is a schematic structural diagram of a part of a security monitoring system based on a mobile terminal according to embodiment 4 of the present invention.
Fig. 6 is a schematic structural diagram of another security monitoring system based on a mobile terminal according to embodiment 4 of the present invention.
Fig. 7 is a schematic structural diagram of an electronic device provided in embodiment 5 of the present invention.
Detailed Description
The invention is further illustrated by the following examples, which are not intended to limit the scope of the invention.
Example 1
The embodiment provides a security monitoring method based on a mobile terminal, as shown in fig. 1, including the following steps:
step 101, judging whether the distance between the mobile terminal and the detection device is within a first preset distance range, wherein the detection device is located in a preset space. Specifically, whether the distance between the mobile terminal and the detection device is within a first preset distance range is judged in a Bluetooth mode, an infrared mode and the like. In the specific implementation process of the present invention, the range of the preset space covers a first preset distance range, and when the distance between the mobile terminal and the detection device is within the first preset distance range, it indicates that the mobile terminal is within the preset space. The preset space includes a conference room, an office area, a restaurant, or the like, and the value of the specific first preset distance range may be set according to the actual size of the preset space.
In an optional implementation manner of step 101, the mobile terminal is a smart phone, and in other optional implementation manners, the mobile terminal may be other positionable electronic devices. The detection device comprises a smart terminal or other network-generating equipment. The network generated by the detection device comprises WiFi (wireless Internet access), Bluetooth and the like, and the range covered by the network forms a first preset distance range. And when the mobile terminal enters the network coverage range generated by the detection device, judging that the distance between the mobile terminal and the detection device is smaller than a first preset distance range.
If yes, go to step 102; if not, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range again.
And 102, starting a first contextual model of the mobile terminal. Specifically, the first contextual model is provided with a corresponding switch, and the switch is turned on by control to turn on the first contextual model. The first contextual model of the mobile terminal can be started by sending a control instruction through the detection device, or the first contextual model can be automatically started by generating a control instruction in the mobile terminal so as to realize automatic opening of the first contextual model, or the first contextual model can be manually started by a user of the mobile terminal so as to be suitable for more scenes.
In an implementation manner that may be selected in step 102, the first contextual model is a conference model of the mobile terminal. In other alternative embodiments, the first scene mode includes any other preset mode.
And 103, detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model.
In an optional implementation manner of step 103, it is determined that other mobile terminals exist by detecting the bluetooth signal, and the distances between the mobile terminal and the other mobile terminals are determined by obtaining GPS data of the other mobile terminals and GPS data of the mobile terminals and comparing coordinates. In other alternative embodiments, the distance between the mobile terminals may be determined by other means, such as indoor positioning techniques.
And step 104, if other mobile terminals with the distances smaller than the first preset threshold exist, sending an alarm.
According to the safety monitoring method based on the mobile terminal, the mobile terminal entering the preset space is controlled to open the first contextual model and obtain the distance between the mobile terminal and other mobile terminals, and an alarm is given when the distance between the mobile terminals exceeds the preset threshold value, so that the safety distance between personnel in the preset space can be guaranteed, the safety monitoring of the personnel in the preset space is realized, and the safety of the personnel in the preset space is guaranteed.
Example 2
The security monitoring method based on the mobile terminal provided in this embodiment is a further improvement on the basis of embodiment 1, and as shown in fig. 2, the security monitoring method based on the mobile terminal further includes the following steps:
and 105, counting the number of the mobile terminals within a second preset distance range from the detection device. The second preset distance range may be the same as or different from the first preset distance range.
And step 106, if the number exceeds a second preset threshold value, giving an alarm.
In the embodiment, the number of the mobile terminals in the first preset range is counted, and an alarm is given when the number exceeds the threshold value, so that the number of the personnel in a certain range can be controlled, and the safety of the personnel in the certain range is ensured.
In another optional embodiment, the security monitoring method further includes the following steps:
and 107, recording a time line of the mobile terminal, a first time corresponding to the mobile terminal entering the preset space and a second time corresponding to the mobile terminal leaving the preset space. The position information of the mobile terminal can be recorded in real time by recording the time line of the mobile terminal. When the preset space is a conference room, the conference joining time and the conference leaving time of the mobile terminal user can be automatically recorded by recording the first time when the mobile terminal enters the preset space and the second time when the mobile terminal leaves the preset space.
In another optional embodiment, the number of the detection devices is multiple, as shown in fig. 3, step 101 specifically includes:
step 1011, determining whether the distance between the mobile terminal and any of the detection devices is within a first preset distance range, if so, executing step 1021, and if not, determining again whether the distance between the mobile terminal and any of the detection devices is within the first preset distance range after a preset time. In the embodiment, a plurality of detection devices are arranged, and a plurality of network ranges are generated by the plurality of detection devices to cover a larger preset space, so that the mobile terminal-based security monitoring method in the embodiment can be also suitable for occasions with larger spaces.
In another optional implementation manner, the mobile terminal-based security monitoring method further includes:
step 1021, if the distance between the mobile terminal and the detection device is judged to be within the first preset distance range, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range again after a preset time, and starting the first contextual model of the mobile terminal only when the distance is judged to be within the first preset distance range again. After the distance between the mobile terminal and the detection device is within the first preset distance range, the mobile terminal user is indicated to enter the preset space, and whether the mobile terminal user is still in the preset space is judged again after the preset time, so that the mobile terminal user passing by accidentally is eliminated, and the accuracy of the result is improved.
In another optional implementation manner, the mobile terminal-based security monitoring method further includes: if the distance between the mobile terminal and the detection device is judged to be within the first preset distance range, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range for multiple times within preset time, and starting the first contextual model of the mobile terminal when the judgment is yes. After the distance between the mobile terminal and the detection device is within the first preset distance range, the fact that the mobile terminal user enters the preset space is indicated, and whether the mobile terminal is in the preset space is judged for many times within the preset time, so that the mobile terminal user passing by accidentally is eliminated, and the accuracy of the result is improved.
In another optional embodiment, the mobile terminal prestores an account number and a password of the wireless network;
and if the mobile terminal is connected with the wireless network, detecting that the mobile terminal exists in a first preset range, and if the mobile terminal is preset with a first contextual model, controlling to open the first contextual model of the mobile terminal.
Optionally, in another embodiment, step 103 specifically includes:
and step 1031, acquiring all other mobile terminals within a third preset distance range from the mobile terminal. It should be noted that the third preset distance range is smaller than the first preset distance range, and the third preset distance range is used for ensuring the safety distance between the persons.
And step 1032, detecting the distance between the mobile terminal and other mobile terminals starting the first scene mode. By setting the third preset distance range, distance judgment of other mobile terminals except the safe distance can be eliminated, the judgment times are reduced, and the accuracy of the judgment result is improved.
Step 1032 is followed by step 104:
and step 104, if other mobile terminals with the distances smaller than the first preset threshold exist, sending an alarm.
In another optional implementation manner, each mobile terminal corresponds to a unique number, and step 105 specifically includes the following steps:
and 1051, acquiring the numbers of all the mobile terminals in the first preset distance range corresponding to each detection device. It should be noted that the number corresponding to the mobile terminal includes a hardware identification code or other preset number of the mobile terminal, and the number of the mobile terminal is acquired by the detection device or the mobile terminal actively sends its own number to the detection device.
Step 1052, summing the obtained numbers of all the mobile terminals, removing the repeated part to count the number of the mobile terminals in the preset space, and sending out an alarm when the number exceeds a third preset threshold value. It should be noted that, under the condition that a plurality of detection devices exist, a network generated by the plurality of detection devices may have a cross portion, at this time, a situation that the plurality of detection devices repeatedly obtain numbers of the same mobile terminal may occur, the numbers of all the mobile terminals are collected and then the number of all the mobile terminals in a preset space is counted by removing the number of the mobile terminals.
In another alternative embodiment, each detection device may also alarm when detecting that the number of mobile terminals within the corresponding network exceeds a threshold value, in order to avoid people gathering.
In another optional implementation, the mobile terminal-based security monitoring method further includes the following steps:
and step 108, presetting the corresponding relation between the serial number of the mobile terminal and the personnel. Specifically, the corresponding relationship includes a person information table or other information that can indicate that the mobile terminal and the corresponding person have a unique corresponding relationship. For example, the number of the mobile phone is in a corresponding relationship with the name, department, post, etc. of the corresponding mobile phone holder.
And step 109, determining the personnel information corresponding to the mobile terminal according to the number and the corresponding relation. Specifically, when the preset space is a conference room, the information of the personnel participating in the conference can be confirmed through the acquired mobile phone number, and when an abnormal condition occurs, the related personnel can be quickly positioned, so that the abnormal condition is timely processed. Under normal conditions, the automatic recording of the information of the participants can be realized.
The following describes a specific application of the security monitoring method based on the mobile terminal according to this embodiment by way of example: setting a detection device, specifically a detector, in a conference room, generating a wireless network after a switch of the detector is turned on, detecting whether the detector exists in a specific range N1 (namely whether the detector exists in the conference room) by whether the mobile terminal is connected to a corresponding network, and directly turning on a switch of a conference mode in the mobile terminal when the detector exists in the specific range N1, namely the detector is connected to the corresponding network, wherein the conference mode is one of first scene modes, and recording related information, including a moving line of the mobile terminal, conference participation time and the like; (the value of the specific range N1 is the first preset distance range, and the value thereof needs to be comprehensively determined according to the range to be detected, such as the position and size of the conference room). When no detector is present within the specified range N1, such as the mobile terminal disconnects the corresponding network, the conference mode is directly turned off and the time of departure from the conference room is recorded. When the mobile terminal is connected with a corresponding network, when the mobile terminal detects the distance between the mobile terminal and other mobile terminals in the specific range N2, an alarm is given out when the distance is smaller than a specified value. N2 needs to make comprehensive decisions based on the range of detection required, such as meeting room location, size. The predetermined value of the distance between the mobile terminals can be set by itself as required. A wireless network is generated after a switch of the detector is turned on, whether a mobile terminal exists in a specific range M or not is continuously detected, and if a new mobile terminal exists, a switch of a corresponding conference mode in the mobile terminal is turned on; the detector is also used for counting the number of mobile terminals in a specific range M and giving an alarm when the number exceeds a specified number.
According to the safety monitoring method based on the mobile terminal, the number of the personnel in the preset space can be monitored by counting the number of the mobile terminals in the preset space, and the alarm is given when the number exceeds the threshold value, so that the safety of the personnel is ensured. Meanwhile, the arrival time, the departure time, the time trend, the personnel information and the like of the personnel in the preset space can be recorded, and the automatic monitoring of the personnel information is realized.
Example 3
The embodiment provides a security monitoring system based on a mobile terminal, as shown in fig. 4, including:
the distance judging module 1 is configured to judge whether a distance between the mobile terminal and the detecting device is within a first preset distance range, where the detecting device is located in a preset space. Specifically, whether the distance between the mobile terminal and the detection device is within a first preset distance range is judged in a Bluetooth mode, an infrared mode and the like. In the specific implementation process of the present invention, the range of the preset space covers a first preset distance range, and when the distance between the mobile terminal and the detection device is within the first preset distance range, it indicates that the mobile terminal is within the preset space. The preset space includes a conference room, an office area, a restaurant, or the like, and the value of the specific first preset distance range may be set according to the actual size of the preset space.
In an optional embodiment, the mobile terminal is a smart phone, and in other optional embodiments, the mobile terminal may be other positionable electronic devices. The detection device comprises a smart terminal or other network-generating equipment. The network generated by the detection device comprises WiFi (wireless Internet access), Bluetooth and the like, and the range covered by the network forms a first preset distance range. And when the mobile terminal enters the network coverage range generated by the detection device, judging that the distance between the mobile terminal and the detection device is smaller than a first preset distance range.
If yes, calling a mode starting module 2;
and the mode starting module 2 is used for starting the first contextual mode of the mobile terminal. Specifically, the first contextual model is provided with a corresponding switch, and the switch is turned on by control to turn on the first contextual model.
In an optional implementation manner, the first contextual model is a conference model of the mobile terminal. In other alternative embodiments, the first scene mode includes any other preset mode.
And the distance detection module 3 is used for detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model.
In an optional implementation manner, the presence of other mobile terminals is determined by detecting the bluetooth signal, and the distances between the mobile terminal and the other mobile terminals are determined by obtaining GPS data of the other mobile terminals and GPS data of the mobile terminals and comparing coordinates. In other alternative embodiments, the distance between the mobile terminals may be determined by other means, such as indoor positioning techniques.
And the first alarm module 4 is used for sending out an alarm if other mobile terminals with the distance smaller than a first preset threshold exist.
The safety monitoring system based on the mobile terminal of the embodiment opens the first contextual model and obtains the distance to other mobile terminals by controlling the mobile terminal entering the preset space, and alarms when the distance between the mobile terminals exceeds the preset threshold value, so that the safety distance between the personnel in the preset space can be ensured, the safety monitoring of the personnel in the preset space is realized, and the safety of the personnel in the preset space is ensured.
Example 4
The security monitoring system based on the mobile terminal provided in this embodiment is a further improvement on the basis of embodiment 3, as shown in fig. 5, the security monitoring system based on the mobile terminal further includes:
and the quantity counting module 5 is used for counting the quantity of the mobile terminals within a second preset distance range from the detection device. Specifically, the second preset distance range may be the same as or different from the first preset distance range.
And the second alarm module 6 is used for sending out an alarm if the number exceeds a second preset threshold value.
In the embodiment, the number of the mobile terminals in the first preset range is counted, and an alarm is given when the number exceeds the threshold value, so that the number of the personnel in a certain range can be controlled, and the safety of the personnel in the certain range is ensured.
In another optional embodiment, the security monitoring system further comprises the steps of:
the recording module 7 is configured to record a time line of the mobile terminal, a first time corresponding to the mobile terminal entering the preset space, and a second time corresponding to the mobile terminal leaving the preset space. The position information of the mobile terminal can be recorded in real time by recording the time line of the mobile terminal. When the preset space is a conference room, the conference joining time and the conference leaving time of the mobile terminal user can be automatically recorded by recording the first time when the mobile terminal enters the preset space and the second time when the mobile terminal leaves the preset space.
In another optional embodiment, the number of the detection devices is multiple, and as shown in fig. 6, the distance determining module 1 is specifically configured to determine whether a distance between the mobile terminal and any one of the detection devices is within a first preset distance range. In the embodiment, a plurality of detection devices are arranged, and a plurality of network ranges are generated by the plurality of detection devices to cover a larger preset space, so that the safety monitoring system based on the mobile terminal can be applied to occasions with larger spaces.
In another optional embodiment, the mobile terminal-based security monitoring system includes:
the first mode starting module 21 is configured to, after determining that the distance between the mobile terminal and the detection device is within the first preset distance range, determine again whether the distance between the mobile terminal and the detection device is within the first preset distance range after a preset time, and start the first contextual mode of the mobile terminal only when the distance is determined to be within the first preset distance range again. After the distance between the mobile terminal and the detection device is within the first preset distance range, the mobile terminal user is indicated to enter the preset space, and whether the mobile terminal user is still in the preset space is judged again after the preset time, so that the mobile terminal user passing by accidentally is eliminated, and the accuracy of the result is improved.
In another optional embodiment, the mobile terminal-based security monitoring system includes: and the second mode starting module is used for judging whether the distance between the mobile terminal and the detection device is within the first preset distance range for multiple times within preset time after judging that the distance between the mobile terminal and the detection device is within the first preset distance range, and starting the first contextual mode of the mobile terminal when the judgment is yes. After the distance between the mobile terminal and the detection device is within the first preset distance range, the fact that the mobile terminal user enters the preset space is indicated, and whether the mobile terminal is in the preset space is judged for many times within the preset time, so that the mobile terminal user passing by accidentally is eliminated, and the accuracy of the result is improved.
In another optional embodiment, the mobile terminal prestores an account number and a password of the wireless network;
and if the mobile terminal is connected with the wireless network, detecting that the mobile terminal exists in a first preset range, and if the mobile terminal is preset with a first contextual model, controlling to open the first contextual model of the mobile terminal.
Optionally, in another embodiment, the distance detection module 3 specifically includes:
an obtaining unit 301, configured to obtain all other mobile terminals within a third preset distance range from the mobile terminal. It should be noted that the third preset distance range is smaller than the first preset distance range, and the third preset distance range is used for ensuring the safety distance between the persons.
A distance detecting unit 302, configured to detect a distance between the mobile terminal and another mobile terminal that starts the first contextual model. By setting the third preset distance range, distance judgment of other mobile terminals except the safe distance can be eliminated, the judgment times are reduced, and the accuracy of the judgment result is improved.
In another optional embodiment, each mobile terminal corresponds to a unique number, and the quantity counting module 5 specifically includes:
the number obtaining unit 51 is configured to obtain numbers of all mobile terminals within a first preset distance range corresponding to each detection device. It should be noted that the number corresponding to the mobile terminal includes a hardware identification code or other preset number of the mobile terminal, and the number of the mobile terminal is acquired by the detection device or the mobile terminal actively sends its own number to the detection device.
And a statistical alarm unit 52, configured to collect the obtained numbers of all the mobile terminals, remove the repeated part to count the number of the mobile terminals in the preset space, and send an alarm when the number exceeds a third preset threshold. It should be noted that, under the condition that a plurality of detection devices exist, a network generated by the plurality of detection devices may have a cross portion, at this time, a situation that the plurality of detection devices repeatedly obtain numbers of the same mobile terminal may occur, the numbers of all the mobile terminals are collected and then the number of all the mobile terminals in a preset space is counted by removing the number of the mobile terminals.
In another alternative embodiment, each detection device in the mobile terminal-based security monitoring system may also alarm when detecting that the number of mobile terminals within the corresponding network exceeds a threshold value, so as to avoid people gathering.
The safety monitoring system based on the mobile terminal also comprises the following modules:
and the presetting module 8 is used for presetting the corresponding relation between the serial number of the mobile terminal and the personnel. Specifically, the corresponding relationship includes a person information table or other information that can indicate that the mobile terminal and the corresponding person have a unique corresponding relationship. For example, the number of the mobile phone is in a corresponding relationship with the name, department, post, etc. of the corresponding mobile phone holder.
And the personnel determining module 9 is used for determining personnel information corresponding to the mobile terminal according to the serial numbers and the corresponding relations. Specifically, when the preset space is a conference room, the information of the personnel participating in the conference can be confirmed through the acquired mobile phone number, and when an abnormal condition occurs, the related personnel can be quickly positioned, so that the abnormal condition is timely processed. Under normal conditions, the automatic recording of the information of the participants can be realized.
The following describes a specific application of the security monitoring system based on the mobile terminal according to this embodiment by way of example: setting a detection device, specifically a detector, in a conference room, generating a wireless network after a switch of the detector is turned on, detecting whether the detector exists in a specific range N1 (namely whether the detector exists in the conference room) by whether the mobile terminal is connected to a corresponding network, and directly turning on a switch of a conference mode in the mobile terminal when the detector exists in the specific range N1, namely the detector is connected to the corresponding network, wherein the conference mode is one of first scene modes, and recording related information, including a moving line of the mobile terminal, conference participation time and the like; (the value of the specific range N1 is the first preset distance range, and the value thereof needs to be comprehensively determined according to the range to be detected, such as the position and size of the conference room). When no detector is present within the specified range N1, such as the mobile terminal disconnects the corresponding network, the conference mode is directly turned off and the time of departure from the conference room is recorded. When the mobile terminal is connected with a corresponding network, when the mobile terminal detects the distance between the mobile terminal and other mobile terminals in the specific range N2, an alarm is given out when the distance is smaller than a specified value. N2 needs to make comprehensive decisions based on the range of detection required, such as meeting room location, size. The predetermined value of the distance between the mobile terminals can be set by itself as required. A wireless network is generated after a switch of the detector is turned on, whether a mobile terminal exists in a specific range M or not is continuously detected, and if a new mobile terminal exists, a switch of a corresponding conference mode in the mobile terminal is turned on; the detector is also used for counting the number of mobile terminals in a specific range M and giving an alarm when the number exceeds a specified number.
The safety monitoring system based on the mobile terminal can monitor the number of personnel in the preset space by counting the number of the mobile terminals in the preset space, and alarm when the number exceeds a threshold value, so that the safety of the personnel is ensured. Meanwhile, the arrival time, the departure time, the time trend, the personnel information and the like of the personnel in the preset space can be recorded, and the automatic monitoring of the personnel information is realized.
Example 5
Fig. 7 is a schematic structural diagram of an electronic device for implementing a security monitoring method based on a mobile terminal according to embodiment 5 of the present invention. The electronic device comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, and the processor executes the computer program to implement the mobile terminal-based security monitoring method of embodiment 1 or 2. The electronic device 30 shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 7, the electronic device 30 may be embodied in the form of a general purpose computing device, which may be, for example, a server device. The components of the electronic device 30 may include, but are not limited to: the at least one processor 31, the at least one memory 32, and a bus 33 connecting the various system components (including the memory 32 and the processor 31).
The bus 33 includes a data bus, an address bus, and a control bus.
The memory 32 may include volatile memory, such as Random Access Memory (RAM)321 and/or cache memory 322, and may further include Read Only Memory (ROM) 323.
Memory 32 may also include a program/utility 325 having a set (at least one) of program modules 324, such program modules 324 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The processor 31 executes various functional applications and data processing, such as the mobile terminal-based security monitoring method provided in embodiment 1 or 2 of the present invention, by running the computer program stored in the memory 32.
The electronic device 30 may also communicate with one or more external devices 34 (e.g., keyboard, pointing device, etc.). Such communication may be through input/output (I/O) interfaces 35. Also, model-generating device 30 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via network adapter 36. As shown in FIG. 7, network adapter 36 communicates with the other modules of model-generating device 30 via bus 33. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the model-generating device 30, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID (disk array) systems, tape drives, and data backup storage systems, etc.
It should be noted that although in the above detailed description several units/modules or sub-units/modules of the electronic device are mentioned, such a division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the units/modules described above may be embodied in one unit/module according to embodiments of the invention. Conversely, the features and functions of one unit/module described above may be further divided into embodiments by a plurality of units/modules.
Example 6
The present embodiment provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the mobile terminal-based security monitoring method provided in embodiment 1 or 2.
More specific examples, among others, that the readable storage medium may employ may include, but are not limited to: a portable disk, a hard disk, random access memory, read only memory, erasable programmable read only memory, optical storage device, magnetic storage device, or any suitable combination of the foregoing.
In a possible implementation, the present invention can also be implemented in the form of a program product including program code for causing a terminal device to perform the steps of implementing the mobile terminal-based security monitoring method of embodiment 1 or 2 when the program product is run on the terminal device.
Where program code for carrying out the invention is written in any combination of one or more programming languages, the program code may execute entirely on the user device, partly on the user device, as a stand-alone software package, partly on the user device and partly on a remote device or entirely on the remote device.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that this is by way of example only, and that the scope of the invention is defined by the appended claims. Various changes and modifications to these embodiments may be made by those skilled in the art without departing from the spirit and scope of the invention, and these changes and modifications are within the scope of the invention.

Claims (16)

1. A security monitoring method based on a mobile terminal is characterized by comprising the following steps:
judging whether the distance between the mobile terminal and a detection device is within a first preset distance range or not, wherein the detection device is positioned in a preset space;
if so, starting a first contextual model of the mobile terminal;
detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model;
and if other mobile terminals with the distances smaller than the first preset threshold exist, giving an alarm.
2. The mobile terminal-based security monitoring method of claim 1, wherein the security monitoring method further comprises:
counting the number of the mobile terminals within a second preset distance range from the detection device;
and if the number exceeds a second preset threshold value, sending out an alarm.
3. The mobile terminal-based security monitoring method of claim 1, wherein the number of the detecting means is plural;
the step of judging whether the distance between the mobile terminal and the detection device is within a first preset distance range specifically comprises:
and judging whether the distance between the mobile terminal and any one of the detection devices is within a first preset distance range.
4. The mobile terminal-based security monitoring method of claim 3, wherein the security monitoring method further comprises:
each mobile terminal corresponds to a unique number;
acquiring the serial numbers of all the mobile terminals in the first preset distance range corresponding to each detection device;
and summarizing the obtained serial numbers of all the mobile terminals, removing repeated parts to count the number of the mobile terminals in the preset space, and giving an alarm when the number exceeds a third preset threshold value.
5. The mobile terminal-based security monitoring method of claim 4, wherein the security monitoring method further comprises:
presetting a corresponding relation between the serial number of the mobile terminal and personnel;
and determining the personnel information corresponding to the mobile terminal according to the serial number and the corresponding relation.
6. The mobile terminal-based security monitoring method according to claim 1, wherein the step of detecting the distance between the mobile terminal and the other mobile terminals that start the first contextual model specifically comprises:
acquiring all other mobile terminals within a third preset distance range from the mobile terminal;
detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model;
and/or the presence of a gas in the gas,
the security monitoring method further comprises:
recording a time moving line of the mobile terminal, a first time corresponding to the mobile terminal entering the preset space and a second time corresponding to the mobile terminal leaving the preset space.
7. The mobile terminal-based security monitoring method of claim 1, wherein the security monitoring method further comprises:
if the distance between the mobile terminal and the detection device is judged to be within a first preset distance range, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range again after preset time, and starting a first contextual model of the mobile terminal when the distance between the mobile terminal and the detection device is judged to be within the first preset distance range again;
and/or the presence of a gas in the gas,
if the distance between the mobile terminal and the detection device is judged to be within a first preset distance range, judging whether the distance between the mobile terminal and the detection device is within the first preset distance range for multiple times within preset time, and starting the first contextual model of the mobile terminal when the judgment is yes.
8. A safety monitoring system based on a mobile terminal is characterized by comprising:
the distance judging module is used for judging whether the distance between the mobile terminal and the detecting device is within a first preset distance range or not, wherein the detecting device is positioned in a preset space;
if yes, calling a mode starting module;
the mode starting module is used for starting a first contextual mode of the mobile terminal;
the distance detection module is used for detecting the distance between the mobile terminal and other mobile terminals starting the first contextual model;
and the first alarm module is used for sending out an alarm if other mobile terminals with the distances smaller than a first preset threshold exist.
9. The mobile terminal-based security monitoring system of claim 8, wherein the security monitoring system further comprises:
the quantity counting module is used for counting the quantity of the mobile terminals within a second preset distance range from the detection device;
and the second alarm module is used for sending out an alarm if the number exceeds a second preset threshold value.
10. The mobile terminal-based security monitoring system of claim 9, wherein the number of the detecting means is plural;
the distance judging module is specifically used for judging whether the distance between the mobile terminal and any one of the detecting devices is within a first preset distance range.
11. The mobile terminal-based security monitoring system of claim 10, wherein the security monitoring system further comprises:
each mobile terminal corresponds to a unique number;
the quantity counting module specifically comprises:
a number obtaining unit, configured to obtain numbers of all the mobile terminals within the first preset distance range corresponding to each detection device;
and the counting alarm unit is used for collecting the obtained serial numbers of all the mobile terminals, removing repeated parts to count the number of the mobile terminals in the preset space, and giving an alarm when the number exceeds a third preset threshold value.
12. The mobile terminal-based security monitoring system of claim 11, wherein the security monitoring system further comprises:
the preset module is used for presetting the corresponding relation between the serial number of the mobile terminal and personnel;
and the personnel determining module is used for determining the personnel information corresponding to the mobile terminal according to the serial number and the corresponding relation.
13. The mobile terminal-based security monitoring system of claim 8, wherein the distance detection module specifically comprises:
the acquisition unit is used for acquiring all other mobile terminals within a third preset distance range from the mobile terminal;
a distance detection unit, configured to detect a distance between the mobile terminal and another mobile terminal that starts the first contextual model;
and/or the presence of a gas in the gas,
the security monitoring system further comprises:
the recording module is used for recording a time line of the mobile terminal, a first time corresponding to the mobile terminal entering the preset space and a second time corresponding to the mobile terminal leaving the preset space.
14. The mobile terminal-based security monitoring system of claim 8, wherein the security monitoring system further comprises:
the first mode starting module is used for judging whether the distance between the mobile terminal and the detection device is within a first preset distance range again after preset time after judging that the distance between the mobile terminal and the detection device is within the first preset distance range, and starting a first contextual mode of the mobile terminal only when the distance between the mobile terminal and the detection device is judged to be within the first preset distance range again;
and/or the presence of a gas in the gas,
and the second mode starting module is used for judging whether the distance between the mobile terminal and the detection device is within a first preset distance range for multiple times within preset time after judging that the distance between the mobile terminal and the detection device is within the first preset distance range, and starting the first contextual mode of the mobile terminal when the judgment is yes.
15. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the mobile terminal-based security monitoring method according to any one of claims 1 to 7 when executing the computer program.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the mobile terminal-based security monitoring method of any one of claims 1 to 7.
CN202011502242.2A 2020-12-18 2020-12-18 Safety monitoring method, system, equipment and medium based on mobile terminal Pending CN112788288A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011502242.2A CN112788288A (en) 2020-12-18 2020-12-18 Safety monitoring method, system, equipment and medium based on mobile terminal
PCT/CN2021/135239 WO2022127614A1 (en) 2020-12-18 2021-12-03 Mobile terminal-based safety monitoring method and system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011502242.2A CN112788288A (en) 2020-12-18 2020-12-18 Safety monitoring method, system, equipment and medium based on mobile terminal

Publications (1)

Publication Number Publication Date
CN112788288A true CN112788288A (en) 2021-05-11

Family

ID=75751142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011502242.2A Pending CN112788288A (en) 2020-12-18 2020-12-18 Safety monitoring method, system, equipment and medium based on mobile terminal

Country Status (2)

Country Link
CN (1) CN112788288A (en)
WO (1) WO2022127614A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022127614A1 (en) * 2020-12-18 2022-06-23 展讯通信(天津)有限公司 Mobile terminal-based safety monitoring method and system, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008113184A (en) * 2006-10-30 2008-05-15 Nec Corp Position monitoring system, position monitoring device, and position monitoring method, and mobile terminal
WO2016095270A1 (en) * 2014-12-19 2016-06-23 深圳市前海安测信息技术有限公司 Safety monitoring system and monitoring method therefor
CN108307463A (en) * 2018-01-30 2018-07-20 江苏信源达科技有限公司 mode switching method, system and access control system
CN111627175A (en) * 2020-05-27 2020-09-04 成都电科崇实科技有限公司 People flow control system based on UWB and infrared temperature measurement
CN111755130A (en) * 2020-06-02 2020-10-09 RealMe重庆移动通信有限公司 Prevention and control method and device, terminal, prevention and control system and readable storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105050045B (en) * 2015-07-23 2019-05-14 深圳市金立通信设备有限公司 A kind of control method and terminal of the SOT state of termination
US10055967B1 (en) * 2017-05-25 2018-08-21 State Farm Mutual Automobile Insurance Company Attentiveness alert system for pedestrians
CN109698934B (en) * 2017-10-23 2021-03-05 中移(苏州)软件技术有限公司 Region monitoring method and device
CN111582052B (en) * 2020-04-17 2023-08-04 深圳市优必选科技股份有限公司 Crowd-intensive early warning method and device and terminal equipment
CN112788288A (en) * 2020-12-18 2021-05-11 展讯通信(天津)有限公司 Safety monitoring method, system, equipment and medium based on mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008113184A (en) * 2006-10-30 2008-05-15 Nec Corp Position monitoring system, position monitoring device, and position monitoring method, and mobile terminal
WO2016095270A1 (en) * 2014-12-19 2016-06-23 深圳市前海安测信息技术有限公司 Safety monitoring system and monitoring method therefor
CN108307463A (en) * 2018-01-30 2018-07-20 江苏信源达科技有限公司 mode switching method, system and access control system
CN111627175A (en) * 2020-05-27 2020-09-04 成都电科崇实科技有限公司 People flow control system based on UWB and infrared temperature measurement
CN111755130A (en) * 2020-06-02 2020-10-09 RealMe重庆移动通信有限公司 Prevention and control method and device, terminal, prevention and control system and readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022127614A1 (en) * 2020-12-18 2022-06-23 展讯通信(天津)有限公司 Mobile terminal-based safety monitoring method and system, device and medium

Also Published As

Publication number Publication date
WO2022127614A1 (en) 2022-06-23

Similar Documents

Publication Publication Date Title
US20220028237A1 (en) Digital fingerprint tracking
US20220351598A1 (en) Enhanced audiovisual analytics
US7555146B2 (en) Identification recognition system for area security
US20130011014A1 (en) Surveillance system and method
JP2005346254A (en) Danger monitoring system
CN106663363B (en) A kind of intelligent alarm system
CN111556444A (en) Intelligent worker card positioning method and system
US11436682B2 (en) Property damage risk evaluation
CN108806151A (en) Monitoring alarm method, device, server and storage medium
CN111105588B (en) Alarm signal merging processing method and system based on fire alarm system
CN114398354A (en) Data monitoring method and device, electronic equipment and storage medium
CN115600953A (en) Monitoring method and device for warehouse positions, computer equipment and storage medium
CN110674728B (en) Method, device, server and storage medium for playing mobile phone based on video image identification
CN112788288A (en) Safety monitoring method, system, equipment and medium based on mobile terminal
CN115641668A (en) Method and device for intelligently and safely monitoring two doors and storage medium
CN112330514B (en) Community public security information evaluation method, device, equipment and storage medium
KR102597815B1 (en) Method for monitoring crime prevention area based on Wireless LAN(Local Area Network)
CN109686060B (en) Monitoring method and device for fitness equipment
KR20190023544A (en) Digital video record apparatus based on sound related iot(internet of things) sensor and method thereof
CN111938586A (en) Visual wisdom office desktop system
CN116596275A (en) Method and device for preventing wrong interval
CN115564171A (en) Data processing method, device and system, electronic equipment and storage medium
CN115565127A (en) Employee supervision method and device, electronic equipment and computer storage medium
TR2021004042A1 (en) A SYSTEM TO CONTROL THE RANGE OF PRODUCTS ON THE SHELF
CN112235534A (en) Intelligent video monitoring system of entity service hall based on one-window comprehensive acceptance of government affair service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210511