CN112837519B - Alarm processing method and system - Google Patents

Alarm processing method and system Download PDF

Info

Publication number
CN112837519B
CN112837519B CN201911156847.8A CN201911156847A CN112837519B CN 112837519 B CN112837519 B CN 112837519B CN 201911156847 A CN201911156847 A CN 201911156847A CN 112837519 B CN112837519 B CN 112837519B
Authority
CN
China
Prior art keywords
alarm
access control
equipment
management
entrance guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911156847.8A
Other languages
Chinese (zh)
Other versions
CN112837519A (en
Inventor
应鹏魁
康卫昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201911156847.8A priority Critical patent/CN112837519B/en
Publication of CN112837519A publication Critical patent/CN112837519A/en
Application granted granted Critical
Publication of CN112837519B publication Critical patent/CN112837519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B27/00Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
    • G08B27/005Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations with transmission via computer network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The embodiment of the invention provides an alarm processing method and system. The method comprises the following steps: the management equipment receives an alarm sent by the first entrance guard equipment and continuously prompts the alarm to a manager; the first access control equipment is any access control equipment in a management area; if the management equipment does not receive the alarm elimination instruction input by the manager within the preset time length, the alarm is sent to all the access control equipment of which the access control level is higher than or not lower than that of the first access control equipment, so that: all the access control devices receiving the alarm continuously prompt the alarm to a user; the management equipment receives an alarm elimination instruction input by a manager or sent by any access control equipment, and sends the alarm elimination instruction to the first access control equipment and all the access control equipment with the level higher than or not lower than that of the first access control equipment. The embodiment of the invention enlarges the alarm range and improves the possibility of timely responding to the alarm.

Description

Alarm processing method and system
Technical Field
The present invention relates to the field of alarm technologies, and in particular, to an alarm processing method, system, electronic device, and non-transitory computer-readable storage medium.
Background
For ease of understanding, the following term explanations are first given:
internet of Things (Internet of Things): and the network of the interconnection of everything enables various sensors and control platforms to be connected with each other and share data.
Indoor set: the visual intercom system is a device which is installed in a household (user) room and provides a visual intercom function and an alarm function.
Entrance machine: the visual intercom system is a device which is arranged outside a resident (user) or a building and provides a visual intercom function and an alarm function.
The wall enclosing machine: the visual intercom system is arranged at the doorway of a residential area (villa) or the enclosure of the residential area (villa) and provides equipment with a visual intercom function and an alarm function.
A management machine: the visual intercom system is installed in a security room or property and provides equipment with functions of visual intercom, receiving alarm, remote unlocking and the like.
The management center: from the client application, the management center is a node for cell integrated management, and is not specifically directed to a certain type of equipment.
The building intercom indoor unit is building intercom equipment which is most widely applied and has the largest quantity in apartment houses in China, and almost every family of every cell is provided with one building intercom indoor unit. The main core functions of the alarm system are talkback, unlocking, alarming, monitoring and the like, the alarm function is the most closely related to the life and property safety of owners, and the alarms at home (such as alarms of smoke, gas, water and invasion) or unit doors and enclosing walls (such as alarms of stress, anti-dismantling and the like) are not discovered and processed by a management center in time to cause more serious accidents.
Fig. 1 is a flow chart of alarm uploading and processing of an existing indoor unit, which includes the following specific steps:
step 101: the indoor unit of the household generates an alarm, and the types of alarms triggered by the indoor unit include but are not limited to a defense area alarm (such as smoke sense, air sense, active infrared, passive infrared, door magnet, emergency switch and the like), an SOS alarm and the like.
Step 102: if the indoor unit is connected with the public network and is registered to the cloud platform, and the user also adds the indoor unit, the alarm of the indoor unit can be uploaded to the mobile phone App of the user, and the user can confirm the alarm trigger source.
Step 103: the indoor unit uploads an alarm to the management machine, and property security personnel in the monitoring center can call an owner or check real-time videos of the door machine and the wall machine for confirmation or confirm the situation on site at an alarm triggering source.
Fig. 2 is a flow chart of alarm uploading and processing of a conventional door phone or wall machine, which includes the following specific steps:
step 201: the unit gate machine or the cell wall machine generates an alarm, and the alarm types which can be triggered by the unit gate machine or the cell wall machine include but are not limited to a tamper alarm, a duress alarm and the like.
Step 202: the unit gate machine or the cell wall machine uploads an alarm to the management machine, and property security personnel in the monitoring center can check real-time videos of the gate machine and the wall machine for confirmation or confirm the situation on site at an alarm triggering source.
It can be seen that, in the current residential area, when an indoor unit or an outdoor unit in a home generates an alarm (e.g., a defense area alarm, a hijacking alarm, etc.), the alarm is usually uploaded to a management center (e.g., a management machine located in a property), and when no one is in the property or a person leaves the property temporarily, the alarm information is often not responded and processed in time, thereby causing greater loss of personal and property.
Disclosure of Invention
The embodiment of the invention provides an alarm processing method, an alarm processing system, electronic equipment and a non-transitory computer readable storage medium, so as to enlarge the alarm range and improve the possibility of timely response of alarm.
The technical scheme of the embodiment of the invention is realized as follows:
an alarm processing method, the method comprising:
the management equipment receives an alarm sent by the first access control equipment and continuously prompts the alarm to a manager; the first access control equipment is any access control equipment in a management area;
if the management equipment does not receive the alarm elimination instruction input by the manager within the preset time length, the alarm is sent to all the access control equipment of which the access control level is higher than or not lower than that of the first access control equipment, so that: all the access control devices receiving the alarm continuously prompt the alarm to a user, wherein the access control devices in the management area are divided into at least two access control levels;
the management equipment receives an alarm elimination instruction input by a manager or sent by any access control equipment, and sends the alarm elimination instruction to the first access control equipment and all the access control equipment with the level higher than or not lower than that of the first access control equipment, wherein any access control equipment sends the alarm elimination instruction to the management equipment after receiving the alarm elimination instruction input by a user.
The management area is a building area, and the management area is a building area,
entrance guard's equipment includes: indoor set still includes: a doorway machine or/and an enclosure machine;
the entrance guard levels of the entrance guard machine and the enclosure machine are the same, and the entrance guard levels of the entrance guard machine and the enclosure machine are higher than those of the indoor machines.
When first entrance guard's equipment is the indoor set, send this warning for all entrance guard's equipment that entrance guard's rank is higher than or is not less than first entrance guard's equipment and do: sending the alarm to all the doorway machines or/and all the wall machines;
when the first entrance guard equipment is a door phone, all the entrance guard equipment which sends the alarm to the entrance guard equipment with the entrance guard level higher than or not lower than the first entrance guard equipment are: sending the alarm to all the entrance machines or/and all the enclosure machines;
when first entrance guard's equipment is the enclosure machine, send this warning for all entrance guard's equipment that entrance guard's rank is higher than or is not less than first entrance guard's equipment and do: and sending the alarm to all the door machines or/and all the wall machines.
When the first access control device is a door phone, the sending the alarm to all door phones or/and all wall phones further includes:
and sending the alarm to all indoor units connected with the doorway machine.
After sending the alarm to all the access control devices with access control levels higher than or not lower than that of the first access control device, the method further comprises the following steps:
after receiving the alarm, any access control equipment shields all business functions except the call manager and the access control equipment calling to send the alarm;
and when any access control equipment receives an alarm elimination instruction input by a user or sent by the management equipment, the shielding of the service function of the access control equipment is removed.
After the management device receives the alarm elimination indication input by the manager or sent by any access control device, the method further comprises the following steps:
the management equipment stops alarming;
after sending the alarm elimination instruction to the first access control equipment and all the access control equipment of which the level is higher than or not lower than the first access control equipment, the method further comprises the following steps:
and after any access control equipment receives the alarm elimination instruction, stopping alarm prompting.
The management device is as follows: a supervisor at the monitoring center, or a management module on the cloud platform.
An alarm processing system, the system comprising:
the system comprises a management device, a first access control device and a second access control device, wherein the management device is used for receiving an alarm sent by the first access control device, continuously prompting the alarm to a manager, sending the alarm to all the access control devices of which the access control levels are higher than or not lower than that of the first access control device if an alarm eliminating instruction input by the manager is not received within a preset time length, and sending the alarm eliminating instruction to the first access control device sending the alarm and all the access control devices of which the levels are higher than or not lower than that of the first access control device if the alarm eliminating instruction input by the manager or sent by any one of the access control devices is received, wherein the first access control device is any access control device in a management area, and the access control devices in the management area are divided into at least two access control levels;
the access control equipment is used for reporting the alarm to the management equipment after receiving the alarm, and reporting the alarm elimination indication to the management equipment if receiving the alarm elimination indication input by a user; and if receiving the alarm sent by the management equipment, continuously prompting the alarm to the user, and stopping prompting the alarm to the user after receiving the alarm elimination instruction sent by the management equipment.
A non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the method as described in any one of the above.
An electronic device, comprising: a non-transitory computer readable storage medium as described above, and a processor having access to the non-transitory computer readable storage medium.
In the embodiment of the present invention, after receiving an alarm sent by a first access control device, if the alarm is not detected to be eliminated within a preset time, a management device sends the alarm to all access control devices having access control levels higher than or not lower than that of the first access control device, so that: all the access control devices receiving the alarm continuously prompt the user for the alarm, so that the alarm range is expanded, and the possibility of timely responding to the alarm is improved.
Drawings
FIG. 1 is a flow chart of alarm uploading and processing of a conventional indoor unit;
fig. 2 is a flow chart of alarm uploading and processing of a conventional doorway machine or wall machine;
FIG. 3 is a flow chart of an alarm processing method according to an embodiment of the present invention;
FIG. 4 is a flowchart of an alarm processing method according to another embodiment of the present invention;
FIG. 5 is a flowchart of an alarm processing method according to another embodiment of the present invention;
FIG. 6 is a flow chart of an alarm processing method according to another embodiment of the present invention;
fig. 7 is a schematic structural diagram of an alarm processing system according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 3 is a flowchart of an alarm processing method according to an embodiment of the present invention, which includes the following specific steps:
step 301: the management equipment receives an alarm sent by the first entrance guard equipment and continuously prompts the alarm to a manager; the first access control equipment is any access control equipment in a management area.
Step 302: if the management equipment does not receive the alarm elimination instruction input by the manager within the preset time length, the alarm is sent to all the access control equipment of which the access control level is higher than or not lower than that of the first access control equipment, so that: and all the access control devices receiving the alarm continuously prompt the alarm to the user.
Step 303: the management equipment receives an alarm elimination instruction input by a manager or sent by any access control equipment, and sends the alarm elimination instruction to the first access control equipment and all the access control equipment with the level higher than or not lower than that of the first access control equipment, wherein any access control equipment sends the alarm elimination instruction to the management equipment after receiving the alarm elimination instruction input by a user.
Through the embodiment, after the management device receives the alarm sent by the first access control device, if the alarm elimination is not detected within the preset time, the alarm is sent to all the access control devices of which the access control levels are higher than or not lower than that of the first access control device, so that: all the access control devices receiving the alarm continuously prompt the user for the alarm, so that the alarm range is expanded, and the possibility of timely responding to the alarm is improved.
In a preferred embodiment, the management area is a building area, and the access control device includes: indoor set still includes: a doorway machine or/and an enclosure machine; the entrance guard levels of the entrance guard machine and the enclosure machine are the same, and the entrance guard levels of the entrance guard machine and the enclosure machine are higher than those of the indoor machines.
When the first access control device is an indoor device, in step 302, the management device sends the alarm to all the access control devices whose access control levels are higher than or not lower than the first access control device: sending the alarm to all the doorway machines or/and all the wall machines;
when the first door access device is a door phone, in step 302, the management device sends the alarm to all the door access devices whose door access level is higher than or not lower than that of the first door access device: sending the alarm to all the doorway machines or/and all the wall machines;
when the first access control device is a wall machine, in step 302, the management device sends the alarm to all access control devices whose access control levels are higher than or not lower than the first access control device: and sending the alarm to all the door machines or/and all the wall machines.
In a preferred embodiment, when the first door access device is an entrance machine, the step 302 of the management device sending the alarm to all entrance machines and/or all wall machines further includes: and sending the alarm to all indoor units connected with the doorway machine.
In a preferred embodiment, the step 302 of sending the alarm to all the access control devices with access control levels higher than or lower than the first access control device by the management device further includes: after receiving the alarm, any access control equipment shields all business functions except the call manager and the access control equipment calling to send the alarm; and when any access control equipment receives an alarm elimination instruction input by a user or sent by the management equipment, the shielding of the service function of the access control equipment is removed.
Through the embodiment, after the alarm is generated, any user can find the alarm at the first time after using the access control equipment receiving the alarm, so that the alarm can be prompted to the user to the greatest extent, and the user can process the alarm in time.
In a preferred embodiment, in step 303, after the management device receives an alarm cancellation indication input by the administrator or sent by any access control device, the method further includes: the management equipment stops alarming;
in step 303, after sending an alarm cancellation indication to the first access control device and all the access control devices with a level higher than or not lower than that of the first access control device, the management device further includes: and after any access control equipment receives the alarm elimination instruction, stopping alarm prompting.
Fig. 4 is a flowchart of an alarm processing method according to another embodiment of the present invention, which includes the following specific steps:
step 401: the indoor unit receives the alarm and uploads the alarm to the management machine.
The alarm received by the indoor unit comprises: and (4) defense area alarm (including smoke sense, gas sense, active infrared, passive infrared, door magnet, emergency switch and the like), SOS alarm and the like.
The sources of the alarm received by the indoor unit are as follows:
1. the user inputs alarm through the keys of the indoor unit;
2. the alarm sent by the indoor alarm detector. The indoor alarm detector can be connected to the indoor unit in a wired mode.
The alarm content uploaded to the management machine by the indoor machine comprises the following steps: the alarm type, the alarm time and the alarm source are as follows: room number, etc.
Step 402: the manager receives the alarm, starts the timer and continuously prompts the alarm to the manager.
The supervisor can show this alarm information on the display interface, include: alarm type, alarm time, alarm source room number, etc.
Step 403: if the manager does not receive the alarm eliminating instruction input by the manager when the timer is over time and does not receive the alarm eliminating instruction sent by the indoor unit sending the alarm, the sending the alarm to all door machines and all wall machines comprises the following steps: alarm type, alarm time, alarm source room number, etc.
The manager of the monitoring center where the manager is located is as follows: the property security personnel can call the owner of the indoor unit or check the real-time video of the door phone and the wall phone of the indoor unit for confirmation, or confirm the situation on site when arriving at an alarm trigger source, and input an alarm elimination instruction to the management machine.
And if the manager receives the alarm elimination instruction input by the manager before the timer is overtime, but does not receive the alarm elimination instruction sent by the indoor unit, the manager sends the alarm elimination instruction to the indoor unit.
Step 404: any gate machine and any wall machine receive the alarm, start to continuously prompt the alarm to the user, and simultaneously shield all service functions except the call manager and the indoor machine calling to send the alarm.
The gate machine and the enclosure machine can display the alarm information on a display interface, and the alarm information comprises the following steps: alarm type, alarm time, alarm source room number, etc.
The door phone or the wall phone shields all service functions except the call manager and the indoor phone calling out the alarm, namely, after receiving a service request, judging whether the service request is the call manager or the indoor phone calling out the alarm, and if not, ignoring the service request; if yes, calling the management machine or calling the indoor machine which sends the alarm.
Step 405: and when detecting that the alarm is eliminated, the management machine sends an alarm elimination instruction to the indoor machine, all the entrance machines and all the wall machines which send the alarm.
The manager detecting the alarm dismissal includes: the manager receives an alarm elimination instruction input by a manager, or receives an alarm elimination instruction sent by an indoor unit, any door phone or any wall phone which sends the alarm.
Step 406: and any door machine or any wall machine receives the alarm elimination instruction, stops the alarm prompt and relieves the shielding of the service function of the door machine or the wall machine.
If the indoor unit is connected with the public network and is registered to the cloud platform, and the user adds the indoor unit to the cloud platform, the indoor unit can upload the alarm to a management module (such as a management App) on the cloud platform. The management module is completely similar to the management machine in the subsequent processing of the alarm.
Fig. 5 is a flowchart of an alarm processing method according to another embodiment of the present invention, which includes the following specific steps:
step 501: and the door phone receives the alarm and uploads the alarm to the management machine.
The alarm received by the entrance machine comprises: tamper alarm, duress alarm, etc.
The alarm content uploaded to the management machine by the gate machine comprises the following steps: alarm type, alarm time, alarm source room number, etc.
Step 502: the manager receives the alarm, starts the timer and continuously prompts the alarm to a manager.
The supervisor can show this alarm information on the display interface, include: alarm type, alarm time, alarm source room number, etc.
Step 503: if the manager does not receive the alarm elimination instruction input by the manager when the timer is over time, and does not receive the alarm elimination instruction sent by the door phone sending the alarm, sending the alarm to all indoor units, other door phones and all wall phones connected with the door phone comprises the following steps: the alarm type, the alarm time and the alarm source are as follows: room number, etc.
All the indoor units connected with the doorway machine are all the indoor units in the unit where the doorway machine is located.
All other outdoor machines, that is, all outdoor machines except the outdoor machine.
The manager of the monitoring center where the manager is located is as follows: the property security personnel can call the gate machine so that a user near the gate machine can process the alarm, or view real-time video of the gate machine for confirmation, or to the alarm triggering source site for confirmation.
And if the manager receives the alarm elimination instruction input by the manager before the timer is overtime but does not receive the alarm elimination instruction sent by the door phone sending the alarm, the manager sends the alarm elimination instruction to the door phone.
Step 504: any indoor unit, any door phone and any wall phone receive the alarm, start to continuously prompt the alarm to the user, and simultaneously shield all service functions except the call manager and the door phone calling the alarm.
Indoor set, gate machine and enclosure machine can show this alarm information on the display interface, include: alarm type, alarm time, alarm source room number, etc.
The indoor unit, the door phone or the wall phone shields all service functions except the call manager and the door phone calling the alarm, namely, after receiving the service request, judging whether the service request is the call manager or the door phone calling the alarm, and if not, ignoring the service request; if yes, calling the management machine or calling the door phone which gives the alarm.
Step 505: and when detecting that the alarm is eliminated, the management machine sends an alarm elimination instruction to all indoor machines, all door machines and all wall machines which receive the alarm.
The manager detecting that the alarm is removed includes: the manager receives the alarm elimination instruction input by the manager, or receives the alarm elimination instruction sent by any indoor unit, any door phone or any wall phone.
Step 506: and any indoor unit or any door machine or any wall machine receives the alarm elimination instruction, stops the alarm prompt and removes the shielding of the service function of the indoor unit or the door machine or the wall machine.
If the door phone is connected with the public network and is registered to the cloud platform, and the user adds the door phone to the cloud platform, the door phone can upload the alarm to a management module (such as a management App) on the cloud platform. The management module is completely similar to the management machine in the subsequent processing of the alarm.
Fig. 6 is a flowchart of an alarm processing method according to another embodiment of the present invention, which includes the following specific steps:
step 601: the wall machine receives the alarm and uploads the alarm to the management machine.
The alarm received by the wall bounding wall machine comprises: tamper alarm, duress alarm, etc.
The alarm content uploaded to the management machine by the wall machine comprises the following steps: alarm type, alarm time, alarm source room number, etc.
Step 602: the manager receives the alarm, starts the timer and continuously prompts the alarm to the manager.
The supervisor can show this alarm information on the display interface, include: alarm type, alarm time, alarm source room number, etc.
Step 603: if the manager does not receive the alarm eliminating instruction input by the manager when the timer is over time and does not receive the alarm eliminating instruction sent by the enclosure machine sending the alarm, sending the alarm to all the gate machines and all other enclosure machines comprises the following steps: alarm type, alarm time, alarm source are as follows: room number, etc.
All other wall machines, i.e., all but the wall machine.
The manager of the monitoring center where the management machine is located comprises the following steps: the property security personnel may call the enclosure to process the alarm for a user near the enclosure, or view real-time video of the enclosure for confirmation, or to the alarm trigger source site for confirmation.
If the manager receives the alarm eliminating instruction input by the manager before the timer is overtime, but does not receive the alarm eliminating instruction sent by the wall machine sending the alarm, the manager sends the alarm eliminating instruction to the wall machine.
Step 604: any gate machine and any wall machine receive the alarm, start to continuously prompt the alarm to the user, and simultaneously shield all service functions except the call manager and the wall machine calling to send the alarm.
The gate machine and the enclosure machine can display the alarm information on a display interface, and the alarm information comprises the following steps: alarm type, alarm time, alarm source room number, etc.
The door phone or the wall phone shields all service functions except the call manager and the wall phone calling the alarm, namely, after receiving the service request, judging whether the service request is the call manager or the wall phone calling the alarm, and if not, ignoring the service request; if yes, calling the manager or calling the fence machine giving out the alarm.
Step 605: and when detecting that the alarm is eliminated, the management machine sends an alarm elimination instruction to all the door machines and all the wall machines.
The manager detecting that the alarm is removed includes: the manager receives the alarm elimination instruction input by the manager, or receives the alarm elimination instruction sent by any door phone or any wall phone.
Step 606: and any door machine or any wall machine receives the alarm elimination instruction, stops the alarm prompt and relieves the shielding of the service function of the door machine or the wall machine.
If the wall machine is connected with the public network and is registered to the cloud platform, and the user adds the wall machine to the cloud platform, the wall machine can upload the alarm to a management module (such as management App) on the cloud platform. The management module is completely similar to the management machine in the subsequent processing of the alarm.
Fig. 7 is a schematic structural diagram of an alarm processing system according to an embodiment of the present invention, where the system mainly includes: management device 71 and entrance guard's device 72, wherein:
the management device 71 is configured to receive an alarm sent by the first access control device, continuously prompt the alarm to a manager, send the alarm to all access control devices with access levels higher than or not lower than that of the first access control device if an alarm elimination instruction input by the manager is not received within a preset time period, and send alarm elimination instructions to the first access control device sending the alarm and all access control devices with levels higher than or not lower than that of the first access control device if an alarm elimination instruction input by the manager or sent by any access control device is received, where the first access control device is any access control device in a management area, and the access control devices in the management area are divided into at least two access levels.
The access control device 72 is configured to report the alarm to the management device 71 after receiving the alarm, and send an alarm elimination instruction to the management device 71 if receiving the alarm elimination instruction input by the user; when receiving the alarm from the management device 71, the user is continuously prompted with the alarm, and when receiving the alarm cancellation instruction from the management device 71, the user is stopped from being prompted with the alarm.
In a preferred embodiment, the management area is a building area, and the access control device includes: indoor set still includes: a doorway machine or/and an enclosure machine; the entrance guard level of the entrance machine is the same as that of the wall machine, and the entrance guard level of the entrance machine is higher than that of the indoor machine.
When the first access control device is an indoor device, the management device 71 sends the alarm to all the access control devices whose access control levels are higher than or not lower than the first access control device: sending the alarm to all the entrance machines or/and all the enclosure machines;
when the first access control device is a door phone, the management device 71 sends the alarm to all the access control devices whose access levels are higher than or lower than the first access control device: sending the alarm to all the doorway machines or/and all the wall machines;
when the first access control device is a wall machine, the management device 71 sends the alarm to all the access control devices whose access control levels are higher than or not lower than the first access control device: and sending the alarm to all the door machines or/and all the wall machines.
In a preferred embodiment, when the first door access device is an entrance machine, the sending of the alarm by the management device 71 to all entrance machines and/or all wall machines further includes: and sending the alarm to all indoor units connected with the doorway machine.
In a preferred embodiment, the management device 71 further comprises, after receiving the alarm cancellation indication input by the administrator or sent by any one of the access control devices: and stopping alarming.
In a preferred embodiment, the management device 71 is: a supervisor at the monitoring center, or a management module on the cloud platform.
Embodiments of the present invention also provide a non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the alarm processing method as follows:
receiving an alarm sent by first entrance guard equipment, and continuously prompting the alarm to a manager; the first access control equipment is any access control equipment in a management area;
if the alarm eliminating instruction input by the manager is not received within the preset time, the alarm is sent to all the access control devices of which the access control levels are higher than or not lower than the first access control device, so that: all the entrance guard equipment receiving the alarm continuously prompts the alarm to a user, wherein the entrance guard equipment in the management area is divided into at least two entrance guard levels;
the method comprises the steps of receiving an alarm elimination instruction input by a manager or sent by any entrance guard device, and sending the alarm elimination instruction to a first entrance guard device and all entrance guard devices of which the levels are higher than or not lower than that of the first entrance guard device, wherein any entrance guard device sends the alarm elimination instruction to a management device after receiving the alarm elimination instruction input by a user.
Embodiments of the present invention also provide an electronic device, including the non-transitory computer readable storage medium as described above, and the above processor having access to the non-transitory computer readable storage medium.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (16)

1. An alarm processing method, characterized in that the method comprises:
the management equipment receives an alarm sent by the first access control equipment and continuously prompts the alarm to a manager; the first access control equipment is any access control equipment in a management area;
if the management equipment does not receive the alarm eliminating instruction input by the manager within the preset time, the alarm is sent to all the access control equipment with the access control level higher than that of the first access control equipment, so that: all the access control devices receiving the alarm continuously prompt the alarm to a user, wherein the access control devices in the management area are divided into at least two access control levels;
the management equipment receives an alarm elimination instruction input by a manager or sent by any access control equipment, and sends the alarm elimination instruction to the first access control equipment and all the access control equipment with the level higher than that of the first access control equipment, wherein any access control equipment sends the alarm elimination instruction to the management equipment after receiving the alarm elimination instruction input by a user;
after sending the alarm to all the access control devices with access control levels higher than that of the first access control device, the method further comprises the following steps:
after receiving the alarm, any access control equipment shields all business functions except the call manager and the access control equipment calling to send the alarm;
and when any access control equipment receives an alarm elimination instruction input by a user or sent by the management equipment, the shielding of the service function of the access control equipment is removed.
2. The method of claim 1, wherein the management area is a building area,
entrance guard's equipment includes: indoor set still includes: a doorway machine or/and an enclosure machine;
the entrance guard level of the entrance machine is the same as that of the wall machine, and the entrance guard level of the entrance machine is higher than that of the indoor machine.
3. The method of claim 2,
when first entrance guard's equipment is the indoor set, send this warning for all entrance guard's equipment that entrance guard's rank is higher than first entrance guard's equipment and be: sending the alarm to all the doorway machines or/and all the wall machines;
when the first entrance guard equipment is a door phone, all the entrance guard equipment which sends the alarm to the entrance guard equipment with the entrance guard level higher than that of the first entrance guard equipment is as follows: sending the alarm to all the doorway machines or/and all the wall machines;
when first entrance guard's equipment is the enclosure machine, send this warning for all entrance guard's equipment that entrance guard's rank is higher than first entrance guard's equipment and be: and sending the alarm to all the door machines or/and all the wall machines.
4. The method of claim 3, wherein when the first door access device is an entrance machine, the sending the alarm to all entrance machines or/and all wall machines further comprises:
and sending the alarm to all indoor units connected with the entrance machine.
5. The method of claim 1, wherein the management device further comprises, after receiving an alarm cancellation indication input by an administrator or sent by any access control device:
the management equipment stops alarming;
after sending the alarm elimination instruction to the first access control device and all the access control devices with the levels higher than the first access control device, the method further comprises the following steps:
and after any access control equipment receives the alarm elimination instruction, stopping alarm prompting.
6. The method of claim 1, wherein the management device is: a supervisor at the monitoring center, or a management module on the cloud platform.
7. An alarm processing method, characterized in that the method comprises:
the management equipment receives an alarm sent by the first access control equipment and continuously prompts the alarm to a manager; the first access control equipment is any access control equipment in a management area;
if the management equipment does not receive the alarm elimination instruction input by the manager within the preset time length, the alarm is sent to all the access control equipment of which the access control level is not lower than that of the first access control equipment, so that: all the entrance guard equipment receiving the alarm continuously prompts the alarm to a user, wherein the entrance guard equipment in the management area is divided into at least two entrance guard levels;
the method comprises the steps that a management device receives an alarm elimination instruction input by a manager or sent by any access control device, and sends the alarm elimination instruction to a first access control device and all access control devices with the levels not lower than that of the first access control device, wherein any access control device sends the alarm elimination instruction to the management device after receiving the alarm elimination instruction input by a user;
after sending the alarm to all the access control devices with the access control level not lower than that of the first access control device, the method further comprises the following steps:
after receiving the alarm, any access control equipment shields all business functions except the call manager and the access control equipment calling to send the alarm;
and when any access control equipment receives an alarm elimination instruction input by a user or sent by the management equipment, the shielding of the service function of the access control equipment is removed.
8. The method of claim 7, wherein the management area is a building area,
entrance guard's equipment includes: indoor set still includes: a doorway machine or/and an enclosure machine;
the entrance guard levels of the entrance machine and the enclosure machine are the same, and the entrance guard levels of the entrance machine and the enclosure machine are not lower than that of the indoor machine.
9. The method of claim 8,
when first entrance guard's equipment is the indoor set, send this warning to all entrance guard's equipment that entrance guard's rank is not less than first entrance guard's equipment and be: sending the alarm to all the doorway machines or/and all the wall machines;
when first entrance guard's equipment is the gate machine, send this warning to all entrance guard's equipment that entrance guard's rank is not less than first entrance guard's equipment and be: sending the alarm to all the doorway machines or/and all the wall machines;
when first entrance guard's equipment is the enclosure machine, send this warning to all entrance guard's equipment that entrance guard's rank is not less than first entrance guard's equipment and do: and sending the alarm to all the door machines or/and all the wall machines.
10. The method of claim 9, wherein when the first door access device is an entrance machine, the sending the alarm to all entrance machines or/and all wall machines further comprises:
and sending the alarm to all indoor units connected with the doorway machine.
11. The method of claim 7, wherein the management device further comprises, after receiving an alarm cancellation indication input by an administrator or sent by any access control device:
the management equipment stops alarming;
send the warning to first entrance guard's equipment and all entrance guard's equipment that the rank is not less than first entrance guard's equipment and eliminate and instruct and then further include:
and after any access control equipment receives the alarm elimination instruction, stopping alarm prompting.
12. The method of claim 7, wherein the management device is: a supervisor at the monitoring center, or a management module on the cloud platform.
13. An alarm processing system, comprising:
the management device is used for receiving an alarm sent by a first access control device, continuously prompting the alarm to a manager, sending the alarm to all access control devices with access levels higher than that of the first access control device if an alarm eliminating instruction input by the manager is not received within a preset time length, and sending the alarm eliminating instruction to the first access control device sending the alarm and all the access control devices with levels higher than that of the first access control device if an alarm eliminating instruction input by the manager or sent by any access control device is received, wherein the first access control device is any access control device in a management area, and the access control devices in the management area are at least divided into two access levels;
the entrance guard equipment is used for reporting the alarm to the management equipment after receiving the alarm, and reporting the alarm elimination instruction to the management equipment if receiving the alarm elimination instruction input by a user; if receiving the alarm sent by the management equipment, continuously prompting the alarm to the user, and stopping prompting the alarm to the user after receiving the alarm elimination instruction sent by the management equipment;
the access control equipment is further used for shielding all service functions except the call manager and the access control equipment calling to send the alarm after receiving the alarm; and when receiving an alarm elimination instruction input by a user or sent by the management equipment, the shielding of the self service function is removed.
14. An alarm processing system, comprising:
the management device is used for receiving an alarm sent by the first access control device, continuously prompting the alarm to a manager, sending the alarm to all the access control devices of which the access control levels are not lower than that of the first access control device if an alarm eliminating instruction input by the manager is not received within a preset time length, and sending the alarm eliminating instruction to the first access control device sending the alarm and all the access control devices of which the levels are not lower than that of the first access control device if an alarm eliminating instruction input by the manager or sent by any one access control device is received, wherein the first access control device is any one of the access control devices in a management area, and the access control devices in the management area are divided into at least two access control levels;
the access control equipment is used for reporting the alarm to the management equipment after receiving the alarm, and reporting the alarm elimination indication to the management equipment if receiving the alarm elimination indication input by a user; if receiving the alarm sent by the management equipment, continuously prompting the alarm to the user, and stopping prompting the alarm to the user after receiving the alarm elimination instruction sent by the management equipment;
after sending the alarm to all the access control devices with the access control level not lower than that of the first access control device, the method further comprises the following steps:
the access control equipment is further used for shielding all service functions except the call manager and the access control equipment calling to send the alarm after receiving the alarm; and when receiving an alarm elimination instruction input by a user or sent by the management equipment, the shielding of the self service function is removed.
15. A non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the method of any of claims 1 to 12.
16. An electronic device, comprising: the non-transitory computer readable storage medium of claim 15, and a processor accessible to the non-transitory computer readable storage medium.
CN201911156847.8A 2019-11-22 2019-11-22 Alarm processing method and system Active CN112837519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911156847.8A CN112837519B (en) 2019-11-22 2019-11-22 Alarm processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911156847.8A CN112837519B (en) 2019-11-22 2019-11-22 Alarm processing method and system

Publications (2)

Publication Number Publication Date
CN112837519A CN112837519A (en) 2021-05-25
CN112837519B true CN112837519B (en) 2022-12-30

Family

ID=75922756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911156847.8A Active CN112837519B (en) 2019-11-22 2019-11-22 Alarm processing method and system

Country Status (1)

Country Link
CN (1) CN112837519B (en)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0102229B1 (en) * 1982-08-27 1987-03-18 Monicell Limited Alarm system
CA2504702A1 (en) * 2002-11-15 2004-06-03 Thomson Licensing S.A. Methods for controlling apparatuses having an emergency alert function
JP3957627B2 (en) * 2002-12-25 2007-08-15 Necモバイリング株式会社 Broadcasting method of disaster prevention radio system using mobile phone
US20070090944A1 (en) * 2005-10-25 2007-04-26 Du Breuil Thomas L Home-monitoring system
JP2012065063A (en) * 2010-09-15 2012-03-29 Mitsubishi Electric Building Techno Service Co Ltd Entrance management system
CN204791233U (en) * 2015-07-07 2015-11-18 广州市盈泽信息科技有限公司 Access control system of integrated wiFi module
CN106952454A (en) * 2017-03-09 2017-07-14 广东中安金狮科创有限公司 One kind alarm automatically updating method and device
KR101993307B1 (en) * 2018-03-26 2019-09-26 주식회사 에이엘에이엔 Method for proceeding dangerous situation using neighbors
CN108615324B (en) * 2018-05-11 2019-03-26 深圳市中电数通智慧安全科技股份有限公司 A kind of fire alarm method, device and terminal device
CN108922109A (en) * 2018-07-16 2018-11-30 柳州治业科技有限公司 A kind of fire protection alarm system based on NB-IOT technology
CN109118700A (en) * 2018-11-01 2019-01-01 北京北信智云科技有限公司 A kind of fire detection interlink alarm system and its method based on LoRaWAN

Also Published As

Publication number Publication date
CN112837519A (en) 2021-05-25

Similar Documents

Publication Publication Date Title
US8504103B2 (en) Cellular home security system
US9368023B2 (en) Notification of security alerts
CA2630308C (en) Video alarm verification
US10289917B1 (en) Sensor to characterize the behavior of a visitor or a notable event
US20030117280A1 (en) Security communication and remote monitoring/response system
KR101292304B1 (en) Intelligent Fire Alarm System and Management Method based on Fire Location Information
KR101841882B1 (en) Unmanned Crime Prevention System and Method
CN102473340A (en) Network-based unmanned security system, methods for providing unmanned security service and for setting up unmanned security system
CN103491345A (en) Visual intercom cloud server and video doorphone system based on cloud technology
CN103593936B (en) Fire alarm remote monitoring method and embedded motherboard
CN109665397A (en) Elevator Internet of Things security protection interactive system and method based on recognition of face
CN110335437A (en) A kind of wisdom house security system based on block chain
CN103354006A (en) Networking alarm service system and hardware equipment arrangement method thereof
CN105632127A (en) Cell security system based on internet of things
CN103325208A (en) Family intelligent safe-guard system
RU2554549C2 (en) Interactive door intercom
CN112837519B (en) Alarm processing method and system
US9449497B2 (en) Method and system for detecting alarm system tampering
CN205541214U (en) Building composite control's intelligent community system
CN107040656A (en) A kind of monitoring method
KR20130097258A (en) Unmanned guard system
CN101354814A (en) Multiplex false alarm-proof control scheme
CN212933288U (en) Safety control platform system for intelligent elevator
JP2005208878A (en) Security system
KR101594053B1 (en) Security System Through Convergence Solutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant