CN113689648B - Intelligent community security management system and method based on Internet of things - Google Patents

Intelligent community security management system and method based on Internet of things Download PDF

Info

Publication number
CN113689648B
CN113689648B CN202110979169.6A CN202110979169A CN113689648B CN 113689648 B CN113689648 B CN 113689648B CN 202110979169 A CN202110979169 A CN 202110979169A CN 113689648 B CN113689648 B CN 113689648B
Authority
CN
China
Prior art keywords
community
module
camera
cameras
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110979169.6A
Other languages
Chinese (zh)
Other versions
CN113689648A (en
Inventor
李焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Rulifang Technology Co ltd
Original Assignee
Shenzhen Rulifang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Rulifang Technology Co ltd filed Critical Shenzhen Rulifang Technology Co ltd
Priority to CN202110979169.6A priority Critical patent/CN113689648B/en
Publication of CN113689648A publication Critical patent/CN113689648A/en
Application granted granted Critical
Publication of CN113689648B publication Critical patent/CN113689648B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an intelligent community security management system and method based on the Internet of things, wherein the management system comprises an authentication database, an access database, a face image acquisition module, a face image verification module, a camera monitoring information acquisition module and a monitoring information analysis module, the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, the access database is used for storing external access personnel information in the community, the face image acquisition module is used for acquiring face images of personnel at an entrance of the community and setting the face images as images to be authenticated, the face image verification module compares the images to be authenticated with resident face images in the authentication database, and if a certain resident face image is consistent with the images to be authenticated, the images to be authenticated pass verification and are allowed to enter the community.

Description

Intelligent community security management system and method based on Internet of things
Technical Field
The invention relates to the technical field of intelligent community security, in particular to an intelligent community security management system and method based on the Internet of things.
Background
The intelligent community integrates various existing service resources of the community by using various intelligent technologies and modes, and provides multiple convenient services such as government affairs, commerce, entertainment, education, medical care, life mutual assistance and the like for the community masses. The setting of wisdom community provides more swift and comfortable intelligent living environment for the resident of wide residential quarter. In the process of building the intelligent community, the security monitoring system also plays an important role.
In the prior art, the security monitoring of the community is mainly realized by arranging workers to manually observe video monitoring through property companies, and the monitoring mode consumes more manpower and has low accuracy.
Disclosure of Invention
The invention aims to provide an intelligent community security management system and method based on the Internet of things, and aims to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: the management system comprises an authentication database, an access database, a face image acquisition module, a face image verification module, a camera monitoring information acquisition module and a monitoring information analysis module, wherein the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, the access database is used for storing external visitor information in the community, the face image acquisition module is used for acquiring face images of personnel at an entrance of the community and setting the face images as images to be authenticated, the face image verification module compares the images to be authenticated with resident face images in the authentication database, when a certain resident face image is consistent with the images to be authenticated, the images to be authenticated pass verification, the personnel are allowed to enter the community, when the images to be authenticated are inconsistent with all resident face images, the personnel corresponding to the images to be authenticated are suspicious personnel, after access information of the suspicious personnel is acquired, the suspicious personnel are allowed to enter the community, the monitoring information acquisition module of the camera monitoring information in the community is enabled, monitoring information acquisition module is used for acquiring m times of monitoring information, and the monitoring information is set in advance in the monitoring information acquisition module and is used for judging whether the alarm information of the monitoring information in the monitoring camera monitoring information in the monitoring information acquisition module.
The monitoring information analysis module comprises a stay time comparison module, an associated camera selection module, an associated threshold comparison module, a monitoring index acquisition module, a monitoring index comparison module and a deep analysis module, wherein the stay time comparison module acquires stay time of doubtful persons in a community and compares the stay time with a stay time threshold, when the stay time is greater than or equal to the stay time threshold, the associated camera selection module extracts and analyzes image information of the doubtful persons acquired by cameras in the community, a camera acquiring an image of the doubtful person is set as an associated camera, the associated threshold comparison module is used for acquiring the distance between the positions of two associated cameras, when the distance between the positions of two associated cameras is greater than or equal to the associated threshold, the monitoring index acquisition module is used for acquiring the monitoring index of the doubtful person, the monitoring index comparison module compares the monitoring index of the doubtful person with the monitoring threshold, and when the monitoring index of the doubtful person is greater than or equal to the associated threshold, the deep analysis module further analyzes the monitoring index acquired by the doubtful person.
The monitoring index obtaining module comprises an associated camera proportion calculating module, a reference area proportion calculating module, a reference time proportion calculating module and a monitoring index calculating module, wherein the associated camera proportion calculating module obtains the number n of associated cameras, calculates the associated camera proportion n/m according to the number n, connects the associated cameras through straight lines, obtains the maximum area Sg of a closed image surrounded by all the associated cameras, and calculates the reference area proportion P = Sg/Sz, wherein Sz is the maximum area of the closed image surrounded by all the cameras after the cameras are connected through straight lines, the reference time proportion calculating module obtains the time interval Tc between the first time node and the second time node when the image of the suspected person is collected by the first associated camera as the first time node, the time node where the image of the suspected person is collected by the latest associated camera as the second time node, and obtains the time interval Tc between the first time node and the second time node as the reference time interval Tc, then the reference time proportion Q = Tc/n, and the monitoring index is calculated according to the current monitoring index Tz + 0.0.
Further, the deep analysis module includes a first sorting module, a second sorting module, a priority camera selection module, a reference distance comparison module and a position transmission module, the first sorting module respectively counts the durations of images of suspicious people collected by each associated camera and sorts the durations in descending order to obtain a first rank, the second sorting module sequentially calculates the difference between two adjacent sorted durations in the front-to-back order from the first rank, sorts the calculated difference according to the corresponding first rank to obtain a second rank, the priority camera selection module sequentially compares the difference in the second rank with a difference threshold in the front-to-back order, if a certain difference is smaller than or equal to the difference threshold, continues to compare the next difference with the difference threshold, if a certain difference is larger than the difference threshold, stops comparing the difference with the difference threshold, sets the associated camera corresponding to the difference before the difference in the second rank as the priority camera, the reference distance comparison module is used for obtaining the position of each priority camera, calculates the average distance between two adjacent cameras, compares the average distance between the two cameras with the reference distance of the reference camera with the reference distance of the suspicious people in the community, and obtains the average distance between the suspicious people in the reference distance, and the average distance between the reference camera transmission module and the reference distance of the suspicious people in the community is equal to the suspicious people collection center, and the average distance of the patrol people.
An intelligent community security management method based on the Internet of things comprises the following steps:
the method comprises the steps that an authentication database and an access database are established in advance, the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, and the access database is used for storing external access personnel information of the community;
acquiring a face image of a person at an entrance of a community, setting the face image as an image to be authenticated, comparing the image to be authenticated with a resident face image in an authentication database, and if the face image of a certain resident is consistent with the image to be authenticated, verifying the image to be authenticated and allowing the person to enter the community;
if the image to be authenticated is inconsistent with the face images of all the residents, the person corresponding to the image to be authenticated is a suspector, and the suspector is allowed to enter the community after the access information of the suspector is collected;
gather the camera monitoring information in the community, the monitoring personnel of suspicing should be in the community activity and judge whether will transmit alarm information in view of the above, wherein, set up m cameras in the community in advance, m is the natural number.
Further, the monitoring the activity of the suspect in the community comprises:
obtaining the stay time of the suspicious person in the community, if the stay time is more than or equal to the stay time threshold, extracting the image information of the suspicious person collected by a camera in the community,
the cameras for collecting the images of the suspect are set as the associated cameras, the number of the associated cameras is n,
respectively obtaining the distance between the positions of every two associated cameras, if the distance between the positions of some two associated cameras is larger than or equal to the associated threshold value,
connecting all the associated cameras through straight lines to obtain the maximum area Sg of a closed image surrounded by all the associated cameras, and calculating a reference area ratio P = Sg/Sz, wherein Sz is the maximum area of the closed image surrounded by all the cameras after the cameras are connected through the straight lines;
acquiring a time node of a first acquired image of the suspect in the associated cameras as a first time node, acquiring a time node of a latest acquired image of the suspect in the associated cameras as a second time node, and acquiring a time interval between the first time node and the second time node as a reference time interval Tc, wherein the reference time ratio Q = Tc/Tz, and Tz is the time interval from the first time node to the current time node;
then the monitoring index U =0.3 x n/m +0.3 x p +0.4 x q for the person in question,
and if the monitoring index of the suspect is larger than or equal to the monitoring threshold, further analyzing images of the suspect collected by the associated camera.
Further, the further analyzing the image of the person in doubt acquired by the associated camera includes:
respectively counting the time length of images of doubtful persons acquired by each associated camera, and sequencing the time lengths according to a sequence from large to small to obtain a first sequence,
sequentially calculating the difference between the time lengths of two adjacent sequences according to the sequence from front to back by the first sequence, sequencing the calculated difference according to the corresponding first sequence to obtain a second sequence,
comparing the difference values in the second sequence with the difference threshold values in sequence from front to back, if a certain difference value is smaller than or equal to the difference threshold value, continuing to compare the next difference value with the difference threshold value, if a certain difference value is larger than the difference threshold value, stopping comparing the difference value with the difference threshold value, and setting the associated camera corresponding to the difference value before the difference value sequence as a priority camera,
and acquiring the position of each priority camera, calculating the average distance between two adjacent priority cameras, comparing the average distance with a reference distance, and transmitting alarm information if the average distance is greater than or equal to the reference distance.
Further, the management method further includes:
when alarm information is transmitted, a camera which collects the person in doubt recently is obtained as a central camera, and the position of the central camera is transmitted to community patrol personnel.
Compared with the prior art, the invention has the following beneficial effects: the invention deduces the moving activity condition of the suspect in the community by acquiring the camera of the suspect, judges whether the suspect is a lawbreaker who wants to perform point-stepping stealing in the community according to the moving activity condition of the suspect, and transmits alarm information when judging that the suspect is a lawbreaker who possibly performs point-stepping stealing, thereby improving the safety performance of the community.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic block diagram of an Internet of things-based intelligent community security management system according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides the following technical solutions: the management system comprises an authentication database, an access database, a face image acquisition module, a face image verification module, a camera monitoring information acquisition module and a monitoring information analysis module, wherein the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, the access database is used for storing external visitor information in the community, the face image acquisition module is used for acquiring face images of personnel at an entrance of the community and setting the face images as images to be authenticated, the face image verification module compares the images to be authenticated with resident face images in the authentication database, when a certain resident face image is consistent with the images to be authenticated, the images to be authenticated pass verification, the personnel are allowed to enter the community, when the images to be authenticated are inconsistent with all resident face images, the personnel corresponding to the images to be authenticated are suspicious personnel, after access information of the suspicious personnel is acquired, the suspicious personnel are allowed to enter the community, the monitoring information acquisition module of the camera monitoring information in the community is enabled, monitoring information acquisition module is used for acquiring m times of monitoring information, and the monitoring information is set in advance in the monitoring information acquisition module and is used for judging whether the alarm information of the monitoring information in the monitoring camera monitoring information in the monitoring information acquisition module.
The monitoring information analysis module comprises a stay time comparison module, a correlation camera selection module, a correlation threshold value comparison module, a monitoring index acquisition module, a monitoring index comparison module and a deep analysis module, wherein the stay time comparison module acquires stay time of doubtful persons in a community and compares the stay time with a stay time threshold value, when the stay time is more than or equal to the stay time threshold value, the correlation camera selection module is used for extracting and analyzing image information of the doubtful persons acquired by cameras in the community, cameras acquiring images of the doubtful persons are set as correlation cameras, the correlation threshold value comparison module is used for acquiring the distance between the positions where every two correlation cameras are located, when the distance between the positions where some two correlation cameras are located is more than or equal to the correlation threshold value, the monitoring index acquisition module is used for acquiring the monitoring index of the doubtful persons, the monitoring index comparison module is used for comparing the monitoring index of the doubtful persons with the monitoring threshold value, and when the monitoring index of the doubtful persons is more than or equal to the monitoring threshold value, the monitoring index of the doubtful persons is further analyzed by the monitoring index comparison module.
The monitoring index obtaining module comprises an associated camera proportion calculating module, a reference area proportion calculating module, a reference time proportion calculating module and a monitoring index calculating module, wherein the associated camera proportion calculating module obtains the number n of associated cameras, calculates the associated camera proportion n/m according to the number n, the reference area proportion calculating module connects the associated cameras through straight lines to obtain the maximum area Sg of a closed image surrounded by all the associated cameras, and calculates the reference area proportion P = Sg/Sz, wherein Sz is the maximum area of the closed image surrounded by all the cameras after the cameras are connected through straight lines, the reference time proportion calculating module obtains the time interval between a first time node and a second time node as a first time node when the first time node collects the image of the person in doubt in the associated cameras, the time node where the last associated camera collects the image of the person in doubt as a second time node, obtains the time interval between the first time node and the second time node as a reference time interval Tc, then the reference time proportion Q = Tc/Tz, wherein the reference time proportion Tz is 0.0.0.0.0.m + the monitoring index is calculated according to the reference time interval between the monitoring index.
The deep analysis module comprises a first sequencing module, a second sequencing module, a priority camera selection module, a reference distance comparison module and a position transmission module, wherein the first sequencing module respectively counts the time length of images of doubtful persons collected by each associated camera and sequences the time lengths from big to small to obtain a first sequence, the second sequencing module sequentially calculates the difference value between two adjacent sequenced time lengths according to the sequence from front to back, sequences the calculated difference value according to the corresponding first sequence to obtain a second sequence, the priority camera selection module sequentially compares the difference value in the second sequence with a difference threshold value according to the sequence from front to back, if a certain difference value is smaller than or equal to the difference threshold value, continues to compare the next difference value with the difference threshold value, if a certain difference value is larger than the difference threshold value, stops comparing the difference value with the difference threshold value, sets the associated camera corresponding to the difference value before the difference value is the priority camera as the priority camera, the reference distance comparison module is used for obtaining the position of each priority camera, calculates the average distance between two adjacent cameras in a community and obtains the average distance of the patrol warning information of the doubtful persons from the reference camera to the center, and transmits the average distance to the reference distance to the patrol center, and obtains the average distance of the patrol warning information of the doubtful persons.
An intelligent community security management method based on the Internet of things comprises the following steps:
the method comprises the steps that an authentication database and an access database are established in advance, the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, and the access database is used for storing external access personnel information of the community;
acquiring a face image of a person at an entrance of a community, setting the face image as an image to be authenticated, comparing the image to be authenticated with a resident face image in an authentication database, and if the face image of a certain resident is consistent with the image to be authenticated, verifying the image to be authenticated and allowing the person to enter the community;
if the image to be authenticated is inconsistent with the face images of all the residents, the person corresponding to the image to be authenticated is a suspector, and the suspector is allowed to enter the community after the access information of the suspector is collected; the access information of the suspect comprises the identity card information of the suspect and the contact information of the suspect,
gather the camera monitoring information in the community, the monitoring personnel of suspicing should be in the community activity and judge whether will transmit alarm information in view of the above, wherein, set up m cameras in the community in advance, m is the natural number. The cameras in the community are connected with the network, the cameras refer to cameras inside the community and outside the building, and the cameras are mainly used for collecting the conditions of coming and going of people inside the community and outside the building;
the monitoring of the activity of the suspicious person in the community comprises the following steps:
acquiring the stay time of the suspicious person in the community, if the stay time is more than or equal to the stay time threshold, extracting the image information of the suspicious person acquired by a camera in the community,
the cameras for collecting the images of the suspect are associated cameras, the number of the associated cameras is n,
respectively obtaining the distance between the positions of every two associated cameras, if the distance between the positions of some two associated cameras is larger than or equal to the associated threshold value,
connecting all the associated cameras through straight lines to obtain the maximum area Sg of a closed image surrounded by all the associated cameras, and calculating a reference area ratio P = Sg/Sz, wherein Sz is the maximum area of the closed image surrounded by all the cameras after the cameras are connected through the straight lines;
acquiring a time node of a first acquired image of the suspect in the associated cameras as a first time node, acquiring a time node of a latest acquired image of the suspect in the associated cameras as a second time node, and acquiring a time interval between the first time node and the second time node as a reference time interval Tc, wherein the reference time ratio Q = Tc/Tz, and Tz is the time interval from the first time node to the current time node;
then the monitoring index U =0.3 × n/m +0.3 × p +0.4 × q for the person in question; in practical situations, the moving track of the person in doubt cannot be easily obtained, and the moving situation of the visiting person in the community is simulated and inferred through a camera in the application; when more cameras are collected for the doubtful persons, and the positions of the cameras collected for the doubtful persons are scattered, the range is higher, the time for the doubtful persons to stay outside a building to walk is longer, the doubtful persons possibly observe and step on the community environment, because the normal visitors outside the community usually visit the community for a certain purpose, generally, the visitors run straight at the destination and stay around rarely, if the external visitors move around in the community, the visitors possibly observe and step on the community environment, and are accurately stolen, but the visitors possibly do not know the internal environment of the community and look for the destination around;
and if the monitoring index of the suspect is larger than or equal to the monitoring threshold, further analyzing the image of the suspect collected by the associated camera.
The further analysis of the image of the person in doubt acquired by the associated camera comprises:
respectively counting the time length of images of the suspect collected by each associated camera, and sequencing the time lengths according to a sequence from big to small to obtain a first sequence,
sequentially calculating the difference between the time lengths of two adjacent sequences according to the sequence from front to back by the first sequence, sequencing the calculated difference according to the corresponding first sequence to obtain a second sequence,
and comparing the difference values in the second sequence with the difference threshold values in sequence from front to back, if a certain difference value is smaller than or equal to the difference threshold value, continuing to compare the next difference value with the difference threshold value, if a certain difference value is larger than the difference threshold value, stopping comparing the difference value with the difference threshold value, setting the associated camera corresponding to the difference value before the difference value sequence as a priority camera, comparing the difference value with the difference threshold value in sequence to select the priority camera, and stopping continuing to compare when the difference value is larger than the difference threshold value for the first time, so that the selected priority camera is more accurate.
And acquiring the position of each priority camera, calculating the average distance between two adjacent priority cameras, comparing the average distance with a reference distance, and transmitting alarm information if the average distance is greater than or equal to the reference distance. Selecting a camera with a longer time length when the doubtful person is acquired by sequentially comparing the difference value with the difference value threshold value, judging according to the position distance of the camera, if the distance between the prior cameras is smaller, the length of the stay time of the doubtful person at a certain position is relatively longer, the doubtful person is probably unknown about the internal environment of the community, and searching for destinations at four positions, if the distance between the prior cameras is larger, and the difference of the stay time lengths of the doubtful person at each position is not large, the doubtful person is trampled, the possibility of being prepared for theft is higher, wherein the prior camera is the camera with the longer time length when the image of the doubtful person is acquired; the method further judges the stay time lengths of the suspect in each place inside the community and outside the building through the time length of the image of the suspect collected by each associated camera, if the suspect is trampled and is prepared for stealing, under the condition, the suspect stays everywhere for observation, the stay time lengths everywhere are not greatly different, if the suspect is not aware of the internal environment of the community and finds destinations everywhere, the stay time lengths of all places should be greatly different, the stay time lengths of places closer to the destinations are relatively longer, and the stay time lengths of places farther away from the destinations are relatively shorter;
the management method further comprises the following steps:
when alarm information is transmitted, a camera which collects the person in doubt recently is obtained as a central camera, and the position of the central camera is transmitted to community patrol personnel.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. The management system is characterized by comprising an authentication database, an access database, a face image acquisition module, a face image verification module, a camera monitoring information acquisition module and a monitoring information analysis module, wherein the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, the access database is used for storing foreign visitor information in the community, the face image acquisition module is used for acquiring face images of personnel at an entrance of the community and setting the face images as images to be authenticated, the face image verification module compares the images to be authenticated with resident face images in the authentication database, if a certain resident face image is consistent with the images to be authenticated, the images to be authenticated pass verification, the personnel are allowed to enter the community, if the images to be authenticated are not consistent with all resident face images, the personnel corresponding to the images to be authenticated are set as suspicious personnel, after acquiring access information of the suspicious personnel, the monitoring information acquisition module of the monitoring information in the community acquires m times of natural camera monitoring information, and the monitoring information acquisition module is used for judging whether the suspicious information is transmitted in advance;
the monitoring information analysis module comprises a stay time comparison module, an associated camera selection module, an associated threshold comparison module, a monitoring index acquisition module, a monitoring index comparison module and a deep analysis module, wherein the stay time comparison module acquires stay time of doubtful persons in a community and compares the stay time with a stay time threshold, when the stay time is more than or equal to the stay time threshold, the associated camera selection module is used for extracting and analyzing image information of the doubtful persons acquired by cameras in the community, a camera acquiring images of the doubtful persons is set as an associated camera, the associated threshold comparison module is used for acquiring the distance between the positions of two associated cameras, when the distance between the positions of two associated cameras is more than or equal to the associated threshold, the monitoring index acquisition module is used for acquiring the monitoring index of the doubtful persons, the monitoring index comparison module is used for comparing the monitoring index of the doubtful persons with the monitoring threshold, and when the monitoring index of the doubtful persons is more than or equal to the monitoring threshold, the monitoring index of the doubtful persons is further analyzed by the monitoring index comparison module;
the monitoring index obtaining module comprises an associated camera proportion calculating module, a reference area proportion calculating module, a reference time proportion calculating module and a monitoring index calculating module, wherein the associated camera proportion calculating module obtains the number n of associated cameras, calculates the associated camera proportion n/m according to the number n, the reference area proportion calculating module connects the associated cameras through straight lines to obtain the maximum area Sg of a closed image surrounded by all the associated cameras, and calculates the reference area proportion P = Sg/Sz, wherein Sz is the maximum area of the closed image surrounded by all the cameras after the cameras are connected through straight lines, the reference time proportion calculating module obtains the time interval between a first time node and a second time node as a first time node when the first time node collects the image of the person in doubt in the associated cameras, the time node where the last associated camera collects the image of the person in doubt as a second time node, obtains the time interval between the first time node and the second time node as a reference time interval Tc, then the reference time proportion Q = Tc/Tz, wherein the reference time proportion Tz is 0.0.0.0.0.m + the monitoring index is calculated according to the reference time interval between the monitoring index.
2. The intelligent community security management system based on the internet of things according to claim 1, wherein: the deep analysis module comprises a first sequencing module, a second sequencing module, a priority camera selection module, a reference distance comparison module and a position transmission module, wherein the first sequencing module respectively counts the time length of images of doubtful persons collected by each associated camera and sequences the time lengths from big to small to obtain a first sequence, the second sequencing module sequentially calculates the difference value between two adjacent sequenced time lengths according to the sequence from front to back, sequences the calculated difference value according to the corresponding first sequence to obtain a second sequence, the priority camera selection module sequentially compares the difference value in the second sequence with a difference threshold value according to the sequence from front to back, if a certain difference value is smaller than or equal to the difference threshold value, continues to compare the next difference value with the difference threshold value, if a certain difference value is larger than the difference threshold value, stops comparing the difference value with the difference threshold value, sets the associated camera corresponding to the difference value before the difference value is the priority camera as the priority camera, the reference distance comparison module is used for obtaining the position of each priority camera, calculates the average distance between two adjacent cameras in a community and obtains the average distance of the patrol warning information of the doubtful persons from the reference camera to the center, and transmits the average distance to the reference distance to the patrol center, and obtains the average distance of the patrol warning information of the doubtful persons.
3. An intelligent community security management method based on the Internet of things is characterized by comprising the following steps: the management method comprises the following steps:
the method comprises the steps that an authentication database and an access database are established in advance, the authentication database is used for storing resident personnel information in a community, the resident personnel information comprises resident face images, and the access database is used for storing external access personnel information of the community;
acquiring a face image of a person at an entrance of a community, setting the face image as an image to be authenticated, comparing the image to be authenticated with a resident face image in an authentication database, and if the face image of a certain resident is consistent with the image to be authenticated, verifying the image to be authenticated and allowing the person to enter the community;
if the image to be authenticated is inconsistent with the face images of all the residents, the person corresponding to the image to be authenticated is a suspector, and the suspector is allowed to enter the community after the access information of the suspector is collected;
collecting monitoring information of cameras in a community, monitoring the activity of the suspect in the community and judging whether alarm information needs to be transmitted or not according to the activity, wherein m cameras are arranged in the community in advance, and m is a natural number;
the monitoring of the activity of the suspect in the community comprises the following steps:
obtaining the stay time of the suspicious person in the community, if the stay time is more than or equal to the stay time threshold, extracting the image information of the suspicious person collected by a camera in the community,
the cameras for collecting the images of the suspect are set as the associated cameras, the number of the associated cameras is n,
respectively obtaining the distance between the positions of every two associated cameras, if the distance between the positions of some two associated cameras is larger than or equal to the associated threshold value,
connecting all the associated cameras through straight lines to obtain the maximum area Sg of a closed image surrounded by all the associated cameras, and calculating a reference area ratio P = Sg/Sz, wherein Sz is the maximum area of the closed image surrounded by all the cameras after the cameras are connected through the straight lines;
acquiring a time node of a first acquired image of the suspect in the associated cameras as a first time node, acquiring a time node of a latest acquired image of the suspect in the associated cameras as a second time node, and acquiring a time interval between the first time node and the second time node as a reference time interval Tc, wherein the reference time ratio Q = Tc/Tz, and Tz is the time interval from the first time node to the current time node;
then the monitoring index U =0.3 x n/m +0.3 x p +0.4 x q for the person in question,
and if the monitoring index of the suspect is larger than or equal to the monitoring threshold, further analyzing the image of the suspect collected by the associated camera.
4. The intelligent community security management method based on the internet of things as claimed in claim 3, wherein: the further analysis of the image of the suspect collected by the associated camera comprises:
respectively counting the time length of images of the suspect collected by each associated camera, and sequencing the time lengths according to a sequence from big to small to obtain a first sequence,
sequentially calculating the difference between the time lengths of two adjacent sequences according to the sequence from front to back by the first sequence, sequencing the calculated difference according to the corresponding first sequence to obtain a second sequence,
comparing the difference values in the second sequence with the difference threshold values in sequence from front to back, if a certain difference value is smaller than or equal to the difference threshold value, continuing to compare the next difference value with the difference threshold value, if a certain difference value is larger than the difference threshold value, stopping comparing the difference value with the difference threshold value, and setting the associated camera corresponding to the difference value before the difference value sequence as a priority camera,
and acquiring the position of each priority camera, calculating the average distance between two adjacent priority cameras, comparing the average distance with a reference distance, and transmitting alarm information if the average distance is greater than or equal to the reference distance.
5. The intelligent community security management method based on the internet of things as claimed in claim 4, wherein: the management method further comprises the following steps:
when alarm information is transmitted, a camera which collects the person in doubt recently is obtained as a central camera, and the position of the central camera is transmitted to community patrol personnel.
CN202110979169.6A 2021-08-25 2021-08-25 Intelligent community security management system and method based on Internet of things Active CN113689648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110979169.6A CN113689648B (en) 2021-08-25 2021-08-25 Intelligent community security management system and method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110979169.6A CN113689648B (en) 2021-08-25 2021-08-25 Intelligent community security management system and method based on Internet of things

Publications (2)

Publication Number Publication Date
CN113689648A CN113689648A (en) 2021-11-23
CN113689648B true CN113689648B (en) 2022-10-18

Family

ID=78582185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110979169.6A Active CN113689648B (en) 2021-08-25 2021-08-25 Intelligent community security management system and method based on Internet of things

Country Status (1)

Country Link
CN (1) CN113689648B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114611136B (en) * 2022-03-01 2024-01-19 淮北鹏顺信息科技有限公司 Internet user privacy protection system and method based on data analysis
CN114898516B (en) * 2022-04-13 2023-05-02 深圳市鸿普森科技股份有限公司 Operation and maintenance monitoring service management system based on Internet of things
CN114820241A (en) * 2022-06-20 2022-07-29 北京北投智慧城市科技有限公司 Scene information management method and system for smart community
CN115238324B (en) * 2022-07-22 2023-03-28 珠海市鸿瑞信息技术股份有限公司 Computer protection system and method based on management use audit safety

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826108A (en) * 2014-03-18 2014-05-28 江苏苏大大数据科技有限公司 Post-loan monitoring method and system based on video image
CN205428085U (en) * 2015-11-30 2016-08-03 武汉理工光科股份有限公司 Indoor security protection system based on fiber grating
CN107578594A (en) * 2017-09-04 2018-01-12 武汉阿卡瑞思光电自控有限公司 Oil-gas pipeline region invasion detecting device and method
JP6525229B1 (en) * 2019-01-25 2019-06-05 株式会社 テクノミライ Digital search security system, method and program
CN110363947A (en) * 2019-07-11 2019-10-22 京东方科技集团股份有限公司 The method and security system of illegal invasion are judged based on WIFI reflection signal
CN110766895A (en) * 2019-09-17 2020-02-07 重庆特斯联智慧科技股份有限公司 Intelligent community abnormity alarm system and method based on target trajectory analysis
CN111583488A (en) * 2020-05-06 2020-08-25 南京众鑫云创软件科技有限公司 Multi-dimensional data model information processing system and method based on artificial intelligence
CN112738468A (en) * 2020-12-25 2021-04-30 四川众望安全环保技术咨询有限公司 Intelligent park safety early warning method and system
CN112863101A (en) * 2021-01-05 2021-05-28 华翔翔能科技股份有限公司 Power distribution room environment and safety monitoring method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826108A (en) * 2014-03-18 2014-05-28 江苏苏大大数据科技有限公司 Post-loan monitoring method and system based on video image
CN205428085U (en) * 2015-11-30 2016-08-03 武汉理工光科股份有限公司 Indoor security protection system based on fiber grating
CN107578594A (en) * 2017-09-04 2018-01-12 武汉阿卡瑞思光电自控有限公司 Oil-gas pipeline region invasion detecting device and method
JP6525229B1 (en) * 2019-01-25 2019-06-05 株式会社 テクノミライ Digital search security system, method and program
CN110363947A (en) * 2019-07-11 2019-10-22 京东方科技集团股份有限公司 The method and security system of illegal invasion are judged based on WIFI reflection signal
CN110766895A (en) * 2019-09-17 2020-02-07 重庆特斯联智慧科技股份有限公司 Intelligent community abnormity alarm system and method based on target trajectory analysis
CN111583488A (en) * 2020-05-06 2020-08-25 南京众鑫云创软件科技有限公司 Multi-dimensional data model information processing system and method based on artificial intelligence
CN112738468A (en) * 2020-12-25 2021-04-30 四川众望安全环保技术咨询有限公司 Intelligent park safety early warning method and system
CN112863101A (en) * 2021-01-05 2021-05-28 华翔翔能科技股份有限公司 Power distribution room environment and safety monitoring method and system

Also Published As

Publication number Publication date
CN113689648A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
CN113689648B (en) Intelligent community security management system and method based on Internet of things
WO2019104949A1 (en) Residential entrance access control system which achieves human big data acquisition and analysis
CN108710827B (en) A kind of micro- police service inspection in community and information automatic analysis system and method
CN110634265B (en) Electric power operation accident potential early warning system and method based on Internet of things
CN109362038A (en) The method and system of guest flow statistics analysis and service based on WiFi probe
CN111080994B (en) Intelligent security system based on Internet of things
CN112969054B (en) Intelligent community police office system based on Internet of things security
CN114038144B (en) AI-based community security monitoring system and method
CN115002150A (en) Intelligent community intelligent epidemic situation management and control system and method
CN102385767A (en) Intelligent entrance guard system based on combination of internet of things and face detection technology and detection method thereof
CN112819326A (en) Epidemic situation prevention and control management system suitable for residential community and construction method thereof
CN112800910A (en) Communication machine room maintenance operation efficiency evaluation method and system
CN115240869A (en) Intelligent infectious disease monitoring and early warning system
CN110930577A (en) Method for analyzing unregistered but actually living in personnel based on entrance guard data
CN112699328A (en) Network point service data processing method, device, system, equipment and storage medium
CN110889790A (en) System for rapidly screening suspected marketing users based on comprehensive community information
CN114170718A (en) Intelligent entrance guard management early warning system based on epidemic situation shared data analysis
CN108537920A (en) Visitor's monitoring method based on recognition of face and system
CN111914780A (en) Wisdom street management platform
CN110969514A (en) Renting security method and system based on Internet of things
CN112990936B (en) Big data-based campus monitoring system and method
CN112291517A (en) Camera data storage method and device
CN107371122B (en) Method for realizing auxiliary positioning based on electronic equipment behavior mode
CN112672379B (en) Method and device for identifying passenger walking path in hub transfer area based on wifi detection technology
CN112689130A (en) Intelligent community security alarm system and method based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant