CN113870508A - Intelligent security gateway arming and disarming method combining facial recognition - Google Patents

Intelligent security gateway arming and disarming method combining facial recognition Download PDF

Info

Publication number
CN113870508A
CN113870508A CN202111130335.1A CN202111130335A CN113870508A CN 113870508 A CN113870508 A CN 113870508A CN 202111130335 A CN202111130335 A CN 202111130335A CN 113870508 A CN113870508 A CN 113870508A
Authority
CN
China
Prior art keywords
security gateway
user
information
personnel
intelligent security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111130335.1A
Other languages
Chinese (zh)
Inventor
邓立德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhitian Wulian Technology Co ltd
Original Assignee
Shenzhen Zhitian Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhitian Wulian Technology Co ltd filed Critical Shenzhen Zhitian Wulian Technology Co ltd
Priority to CN202111130335.1A priority Critical patent/CN113870508A/en
Publication of CN113870508A publication Critical patent/CN113870508A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • G08B13/19615Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion wherein said pattern is defined by the user
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The invention discloses a defense deploying and withdrawing method of an intelligent security gateway in combination with face identification, which comprises an integrated intelligent security gateway device, wherein a system single chip, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna are arranged in the integrated intelligent security gateway device, the 4G/5G LTE communication module, the Sub1GHz RF, the 2.4G/5GHz WIFI and the Bluetooth are connected with the system single chip signal and the antenna signal, the integrated intelligent security gateway device is a security gateway, an object is detected through a distance Sensor, a camera is awakened after the object is detected, and face detection and identification are carried out; judging whether the user is an authorized user or not, judging the user is an unknown user if the user is not authorized, warning an administrator user and returning to the security gateway to standby, if the user is authorized, waking up the security gateway to be backlight, starting the security gateway to operate and authorize, and sending an event notice to the mobile phone APP and the security cloud.

Description

Intelligent security gateway arming and disarming method combining facial recognition
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a method for arming and disarming an intelligent security gateway by combining facial recognition.
Background
At present, the arming and disarming of similar products are all performed in a mode of inputting passwords on an intelligent gateway, and hierarchical partitioned arming and disarming management is not performed by combining image analysis of facial recognition. The password is easy to leak, and any person can easily remove the security management system after stealing the password and cause the risk of property loss.
Disclosure of Invention
The present invention provides a method for arming and disarming an intelligent security gateway by combining face recognition, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: intelligent security gateway that combines facial discernment includes integrated intelligent security gateway device, its characterized in that: the integrated intelligent security gateway device is characterized in that a system single chip, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna are arranged inside the integrated intelligent security gateway device, the 4G/5GLTE communication module, the Sub1GHz RF, the 2.4G/5GHz WIFI are connected with system single chip signals and antenna signals, and the integrated intelligent security gateway device is a security gateway.
Preferably, the security gateway includes treater, memory, distance sensor, artificial intelligence engine, embedded camera, radio frequency communication module, functional module, the supporting APP that uses of security gateway, through 4G/5G LTE communication module and APP high in the clouds remote connection.
Preferably, the output ends of the distance sensor, the embedded camera, the radio frequency communication module and the function module are electrically connected with the input end of the processor, the other output end of the embedded camera is electrically connected with the input end of the memory, the output end of the processor is electrically connected with the input ends of the memory and the artificial intelligence engine, and the processor compares the image in the memory with the acquired image entry similarity through calling the image in the memory and the artificial intelligence engine.
Preferably, the method for arming and disarming the intelligent security gateway by combining facial recognition comprises the following steps:
s1, pre-registering the facial features of each user of the family, and setting different defense and use authorities for different user identities;
s2, besides the face features of family members, the face features of relatives and friends can be set, a group is set for the members except the family members separately, and different defense and use authorities are set for the personnel identities in the group;
s21, when recording, it can preset various facial expressions or actions, such as binding, putting up, holding and binding, etc, the grouping can be named as "holding mode", when the security system catches the signal, it can alarm automatically;
s22 temporary mode, firstly, the householder collects the information of the personnel who need to enter the room regularly in advance through image collection, such as the cleaning personnel employed by the householder, and the like, so that the householder can enter the room to carry out various works when not at home, and then the householder carries out the regular operation through the control terminal, namely the temporary working time is set, on one hand, the working efficiency of the personnel entering the room can be improved, and the work can be completed in a specific time; on the other hand, in order to reduce the waiting time of temporary external personnel indoors and avoid the loss of the temporary personnel to the householder, in a specific working time, when the householder receives a network signal and knows that the temporary personnel enter the house, partial facilities in the house can be controlled to be closed through a remote wireless signal, namely, disarming is carried out, the temporary personnel are prevented from mistakenly touching the indoor security alarm, the closed security alarm does not contain monitoring video content, other time periods do not pass through facial recognition, when the temporary personnel do not work any more, old user information can be deleted through the gateway, and when the user with the deleted information uses the facial recognition again, the user with the deleted information does not pass through the opening;
s23 temporary supervision mode, in outdoor monitoring equipment, the doorway is monitored and information is collected without shutting down, the collected information is the character information staying in front of the main door of the house every day and is stored, when the information collected by the system is approximately the same every day, no action is taken, when the collected information is strange or appears in front of the main door of the house for the first time, or when the collected information is temporary and stays in front of the door for a long time, the information collection system uploads the collected information to the gateway and transmits the information to the owner for the first time to warn, the owner can remotely control the user information to temporarily collect, sets corresponding authority through the mobile phone terminal, sets marshalling, the temporarily collected user information can be marshalled to be the marshalling of common users, temporary personnel, unwelpful people and the like, when the user information is collected again next time, the early warning is not sent out after the first two groups are grouped, the early warning is sent out after the third group is started, a user can change the previously recorded information groups through a terminal, and the set authority can be updated to the authority of the latest grouped member after the change;
s3 automatically identifies different users and records the operation records of the different users on the intelligent security gateway, and manages and controls the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users.
Preferably, the specific steps of step S3 are as follows:
s31 the security gateway stands by, detects an object through the distance sensor, wakes up the camera after detecting the object, and then carries out face detection and identification;
s32, judging whether the user is an authorized user or not, judging the user to be an unknown user if the user is not, warning an administrator user and returning to the security gateway to wait for yes, waking up the security gateway to be back-lighted, starting the security gateway to operate and authorize, sending an event notice to the mobile phone APP and the security cloud, and then ending and waiting for the security gateway.
Preferably, in the step S32, when the determination result is yes, the two cases are divided into two cases, one case is that the family member is authenticated as yes, and the other case is that the friends and family are authenticated as yes, in this step, the processor calls the image in the memory, and also calls the information of the group where the image is located, when the family member is authenticated, automatically wakes up the security gateway backlight, starts the security gateway operation authorization, when the group authentication of friends and family is yes, the security gateway backlight and the related security gateway operation cannot be woken up, and sends an event notification to the mobile phone APP and the security cloud, and when the mobile phone terminal agrees, the security gateway backlight can be woken up, and the security gateway operation authorization is started.
Compared with the prior art, the invention has the beneficial effects that:
1. the intelligent security gateway arming and disarming method combining facial recognition comprises the steps that when facial features of all users of a family are registered in advance, and different arming and using authorities are set for identities of different users, the system can automatically match and record operation information of the users aiming at the intelligent security gateway, arming and disarming of different protection areas and different protection degrees are carried out through the facial recognition, meanwhile, when unregistered operators approach or touch the intelligent security gateway, messages with images are sent to managers in real time to carry out prevention warning, a warning passes through a distance sensor to detect an object, a camera is awakened after the used object is detected, then facial detection and recognition are carried out, and the intelligent security gateway is realized.
2. The intelligent security gateway arming and disarming method combining facial recognition can also bind other equipment in the house, such as a safety box intelligent lock, is connected to a mobile phone terminal through Bluetooth and a communication module in the intelligent security gateway, can control personnel capable of opening a coded lock through setting authority, and can ensure that the house and the office are safe and intelligent.
Drawings
FIG. 1 is a system on a chip, Proximity sensors, Image Sensor,4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and antenna, through an internal artificial intelligence processor and an Image analysis algorithm to construct a complete architecture diagram for system application;
FIG. 2 is a diagram of a user registration process, in which a camera built in an intelligent security gateway device obtains a face image of a user, facial features are extracted by an image analysis technique to achieve application of facial recognition, and different usage permission diagrams are set for different users;
FIG. 3 is a schematic diagram of a system flow when the intelligent security gateway detects that an object is approaching;
FIG. 4 is a flowchart illustrating the operation of the system when the intelligent security gateway detects that an object is approaching;
FIG. 5 is a schematic diagram of a system flow of the intelligent security gateway when detecting that an unauthorized user operates the intelligent security gateway;
fig. 6 is a schematic flow chart of a system for the intelligent security gateway temporary visitor.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b): referring to fig. 1-6, the present invention provides a technical solution: an intelligent security gateway combining face identification comprises an integrated intelligent security gateway device, a system single chip is arranged inside the integrated intelligent security gateway device, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna, the 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, the Bluetooth is connected with the system single chip signal and the antenna signal, and the integrated intelligent security gateway device is a security gateway.
The security gateway comprises a processor, a memory, a distance sensor, an artificial intelligence engine, an embedded camera, a radio frequency communication module and a functional module, wherein the security gateway is matched with an APP and is remotely connected with the APP in a cloud side through a 4G/5GLTE communication module.
The output ends of the distance sensor, the embedded camera, the radio frequency communication module and the functional module are electrically connected with the input end of the processor, the other output end of the embedded camera is electrically connected with the input end of the memory, the output end of the processor is electrically connected with the input ends of the memory and the artificial intelligence engine, and the processor compares the images in the memory with the acquired image entry similarity through calling the images in the memory and the artificial intelligence engine.
The intelligent security gateway arming and disarming method combining facial recognition comprises the following steps:
s1, pre-registering the facial features of each user of the family, and setting different defense and use authorities for different user identities;
s2, besides the face features of family members, the face features of relatives and friends can be set, a group is set for the members except the family members separately, and different defense and use authorities are set for the personnel identities in the group;
s21, when recording, it can preset various facial expressions or actions, such as binding, putting up, holding and binding, etc, the grouping can be named as "holding mode", when the security system catches the signal, it can alarm automatically;
s22 temporary mode, firstly, the householder collects the information of the personnel who need to enter the room regularly in advance through image collection, such as the cleaning personnel employed by the householder, and the like, so that the householder can enter the room to carry out various works when not at home, and then the householder carries out the regular operation through the control terminal, namely the temporary working time is set, on one hand, the working efficiency of the personnel entering the room can be improved, and the work can be completed in a specific time; on the other hand, in order to reduce the waiting time of temporary external personnel indoors and avoid the loss of the temporary personnel to the householder, in a specific working time, when the householder receives a network signal and knows that the temporary personnel enter the house, partial facilities in the house can be controlled to be closed through a remote wireless signal, namely, disarming is carried out, the temporary personnel are prevented from mistakenly touching the indoor security alarm, the closed security alarm does not contain monitoring video content, other time periods do not pass through facial recognition, when the temporary personnel do not work any more, old user information can be deleted through the gateway, and when the user with the deleted information uses the facial recognition again, the user with the deleted information does not pass through the opening;
s23 temporary supervision mode, in outdoor monitoring equipment, the doorway is monitored and information is collected without shutting down, the collected information is the character information staying in front of the main door of the house every day and is stored, when the information collected by the system is approximately the same every day, no action is taken, when the collected information is strange or appears in front of the main door of the house for the first time, or when the collected information is temporary and stays in front of the door for a long time, the information collection system uploads the collected information to the gateway and transmits the information to the owner for the first time to warn, the owner can remotely control the user information to temporarily collect, sets corresponding authority through the mobile phone terminal, sets marshalling, the temporarily collected user information can be marshalled to be the marshalling of common users, temporary personnel, unwelpful people and the like, when the user information is collected again next time, the early warning is not sent out after the first two groups are grouped, the early warning is sent out after the third group is started, a user can change the previously recorded information groups through a terminal, and the set authority can be updated to the authority of the latest grouped member after the change;
s3 automatically identifies different users and records the operation records of the different users on the intelligent security gateway, and manages and controls the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users.
The specific steps of step S3 are as follows:
s31 the security gateway stands by, detects an object through the distance sensor, wakes up the camera after detecting the object, and then carries out face detection and identification;
s32, judging whether the user is an authorized user or not, judging the user to be an unknown user if the user is not, warning an administrator user and returning to the security gateway to wait for yes, waking up the security gateway to be back-lighted, starting the security gateway to operate and authorize, sending an event notice to the mobile phone APP and the security cloud, and then ending and waiting for the security gateway.
In the present embodiment, the first and second electrodes are,
in the step S32, when the determination result is yes, the authentication of the family member is yes, and the authentication of the family member and the authentication of the friends and relatives are yes, in this step, the processor calls the image in the memory, and also calls the information of the group in which the image is located, when the family member is, automatically wakes up the security gateway backlight, starts the security gateway operation authorization, when the group authentication of the friends and relatives is yes, the security gateway backlight and the related security gateway operation cannot be woken up, and sends an event notification to the mobile phone APP and the security cloud, and when the mobile phone terminal agrees, the security gateway backlight can be woken up, and the security gateway operation authorization is started.
The working principle is as follows: firstly, the facial features of each user of a family need to be registered in advance, and different defense deployment and use authorities are set for the identities of different users; automatically identifying different users, recording operation records of the different users on the intelligent security gateway, and managing and controlling the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users;
the security gateway waits for orders, detects an object through a distance sensor, wakes up a camera after detecting the object, and then carries out face detection and identification; judging whether the user is an authorized user or not, judging whether the user is an unknown user or not, warning an administrator user and returning to the security gateway to stand by, if so, waking up the security gateway backlight, starting the security gateway operation authorization, sending an event notice to a mobile phone APP and a security cloud, and then ending, standing by the security gateway, wherein when the judgment result is yes, the two cases are divided into two cases, one case is that a family member is authenticated as yes, and the other case is that friends and relatives are authenticated as yes, in the step, a processor calls an image in a memory, the information of a group where the image is located is also called, when the family member is, the security gateway backlight is automatically waken up, the security gateway operation authorization is started, when the authentication of friends and relatives is yes, the security gateway backlight and related security gateway operation cannot be waken up, and the event notice is sent to the mobile phone APP and the security cloud, the security gateway backlight can be awakened only under the condition that the mobile phone terminal agrees to start the security gateway for operation authorization, meanwhile, other devices in the house can be bound by the intelligent security gateway, such as a safe intelligent lock, the intelligent security gateway is connected to the mobile phone terminal through Bluetooth and a communication module inside the intelligent security gateway, and the personnel capable of opening the coded lock can be controlled through setting authority, so that the safety and the intelligence of the house and the office can be better achieved.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. Intelligent security gateway that combines facial discernment includes integrated intelligent security gateway device, its characterized in that: the integrated intelligent security gateway device is characterized in that a system single chip, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna are arranged inside the integrated intelligent security gateway device, the 4G/5G LTE communication module, the Sub1GHz RF, the 2.4G/5GHz WIFI and the Bluetooth are connected with the system single chip signal and the antenna signal, and the integrated intelligent security gateway device is a security gateway.
2. The intelligent security gateway combined with facial recognition as claimed in claim 1, wherein: the security gateway comprises a processor, a memory, a distance sensor, an artificial intelligence engine, an embedded camera, a radio frequency communication module and a functional module, wherein the security gateway is matched with an APP and is remotely connected with the APP in a cloud mode through a 4G/5G LTE communication module.
3. The intelligent security gateway combined with facial recognition as claimed in claim 2, wherein: the output ends of the distance sensor, the embedded camera, the radio frequency communication module and the functional module are electrically connected with the input end of the processor, the other output end of the embedded camera is electrically connected with the input end of the memory, the output end of the processor is electrically connected with the input ends of the memory and the artificial intelligence engine, and the processor compares the image in the memory with the acquired image entry similarity through calling the image in the memory and the artificial intelligence engine.
4. An intelligent security gateway arming and disarming method combining facial recognition is characterized by comprising the following steps:
s1, pre-registering the facial features of each user of the family, and setting different defense and use authorities for different user identities;
s2, besides the face features of family members, the face features of relatives and friends can be set, a group is set for the members except the family members separately, and different defense and use authorities are set for the personnel identities in the group;
s21, when recording, it can preset various facial expressions or actions, such as binding, putting up, holding and binding, etc, the grouping can be named as "holding mode", when the security system catches the signal, it can alarm automatically;
s22 temporary mode, firstly, the householder collects the information of the personnel who need to enter the room regularly in advance through image collection, such as the cleaning personnel employed by the householder, and the like, so that the householder can enter the room to carry out various works when not at home, and then the householder carries out the regular operation through the control terminal, namely the temporary working time is set, on one hand, the working efficiency of the personnel entering the room can be improved, and the work can be completed in a specific time; on the other hand, in order to reduce the waiting time of temporary external personnel indoors and avoid the loss of the temporary personnel to the householder, in a specific working time, when the householder receives a network signal and knows that the temporary personnel enter the house, partial facilities in the house can be controlled to be closed through a remote wireless signal, namely, disarming is carried out, the temporary personnel are prevented from mistakenly touching the indoor security alarm, the closed security alarm does not contain monitoring video content, other time periods do not pass through facial recognition, when the temporary personnel do not work any more, old user information can be deleted through the gateway, and when the user with the deleted information uses the facial recognition again, the user with the deleted information does not pass through the opening;
s23 temporary supervision mode, in outdoor monitoring equipment, monitoring and information collecting are carried out on doorways without shutting down, the collected information is the character information staying in front of a main door of a house every day and is stored, when the collected information of the system is approximately the same every day, no action is taken, when strange people or people staying in front of the main door of the house are collected, or when temporary personnel stay in front of the door for a long time, the collected information is uploaded to a gateway by the information collection system and is transmitted to a householder for the first time to carry out early warning, the householder can remotely control and temporarily collect user information, sets corresponding authorities through a mobile phone terminal, and sets grouping at the same time;
s3 automatically identifies different users and records the operation records of the different users on the intelligent security gateway, and manages and controls the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users.
5. The method for arming and disarming an intelligent security gateway with face recognition according to claim 4, wherein the step S3 includes the following steps:
s31 the security gateway stands by, detects an object through the distance sensor, wakes up the camera after detecting the object, and then carries out face detection and identification;
s32, judging whether the user is an authorized user or not, judging the user to be an unknown user if the user is not, warning an administrator user and returning to the security gateway to wait for yes, waking up the security gateway to be back-lighted, starting the security gateway to operate and authorize, sending an event notice to the mobile phone APP and the security cloud, and then ending and waiting for the security gateway.
6. The method of claim 5, wherein the intelligent security gateway arming and disarming with facial recognition comprises: in the step S32, when the determination result is yes, the authentication of the family member is yes, and the authentication of the friends and relatives is yes, in this step, the processor calls the image in the memory, and also calls the information of the group where the image is located, when the family member is, automatically wakes up the security gateway backlight, starts the security gateway operation authorization, when the group authentication of the friends and relatives is yes, the security gateway backlight and the related security gateway operation cannot be woken up, and sends an event notification to the mobile phone APP and the security cloud, and when the mobile phone terminal agrees, the security gateway backlight can be woken up, and the security gateway operation authorization is started.
CN202111130335.1A 2021-09-26 2021-09-26 Intelligent security gateway arming and disarming method combining facial recognition Pending CN113870508A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111130335.1A CN113870508A (en) 2021-09-26 2021-09-26 Intelligent security gateway arming and disarming method combining facial recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111130335.1A CN113870508A (en) 2021-09-26 2021-09-26 Intelligent security gateway arming and disarming method combining facial recognition

Publications (1)

Publication Number Publication Date
CN113870508A true CN113870508A (en) 2021-12-31

Family

ID=78994755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111130335.1A Pending CN113870508A (en) 2021-09-26 2021-09-26 Intelligent security gateway arming and disarming method combining facial recognition

Country Status (1)

Country Link
CN (1) CN113870508A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114699005A (en) * 2022-03-08 2022-07-05 向道全 Intelligent tissue machine that possesses theftproof function
CN115439971A (en) * 2022-08-31 2022-12-06 中国工商银行股份有限公司 Self-service bank access control monitoring management method and system
CN115550615A (en) * 2022-11-28 2022-12-30 云丁网络技术(北京)有限公司 Video recording method and device for intelligent equipment, electronic equipment and storage medium
CN116543484A (en) * 2023-06-14 2023-08-04 广东维信智联科技有限公司 Two-way checking anti-decoding system based on secret cabinet

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108510704A (en) * 2018-05-22 2018-09-07 华翔翔能(湖南)能源科技有限公司 A kind of office's safety protection method
CN208126627U (en) * 2018-04-20 2018-11-20 成都安密电子系统工程有限公司 A kind of multipurpose safety alarm monitoring terminal
CN111768580A (en) * 2020-06-30 2020-10-13 上海上实龙创智能科技股份有限公司 Indoor anti-theft system and anti-theft method based on edge gateway
CN212624326U (en) * 2020-08-03 2021-02-26 深圳金智凌轩视讯技术有限公司 Intelligent recognition alarm system
CN113507408A (en) * 2021-06-09 2021-10-15 深圳市智天物联科技有限公司 Intelligent security gateway arming and disarming method combining facial recognition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN208126627U (en) * 2018-04-20 2018-11-20 成都安密电子系统工程有限公司 A kind of multipurpose safety alarm monitoring terminal
CN108510704A (en) * 2018-05-22 2018-09-07 华翔翔能(湖南)能源科技有限公司 A kind of office's safety protection method
CN111768580A (en) * 2020-06-30 2020-10-13 上海上实龙创智能科技股份有限公司 Indoor anti-theft system and anti-theft method based on edge gateway
CN212624326U (en) * 2020-08-03 2021-02-26 深圳金智凌轩视讯技术有限公司 Intelligent recognition alarm system
CN113507408A (en) * 2021-06-09 2021-10-15 深圳市智天物联科技有限公司 Intelligent security gateway arming and disarming method combining facial recognition

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114699005A (en) * 2022-03-08 2022-07-05 向道全 Intelligent tissue machine that possesses theftproof function
CN115439971A (en) * 2022-08-31 2022-12-06 中国工商银行股份有限公司 Self-service bank access control monitoring management method and system
CN115550615A (en) * 2022-11-28 2022-12-30 云丁网络技术(北京)有限公司 Video recording method and device for intelligent equipment, electronic equipment and storage medium
CN115550615B (en) * 2022-11-28 2023-07-21 云丁网络技术(北京)有限公司 Video recording method and device of intelligent equipment, electronic equipment and storage medium
CN116543484A (en) * 2023-06-14 2023-08-04 广东维信智联科技有限公司 Two-way checking anti-decoding system based on secret cabinet
CN116543484B (en) * 2023-06-14 2023-12-22 广东维信智联科技有限公司 Two-way checking anti-decoding system based on secret cabinet

Similar Documents

Publication Publication Date Title
US11785146B2 (en) Doorbell call center
CN113870508A (en) Intelligent security gateway arming and disarming method combining facial recognition
CN107023224B (en) Door lock opening control method and system based on active security
CN108412315B (en) Intelligent door lock warning system and control method thereof
CN202257879U (en) Intelligentized safety monitoring system for residential area
CN105279872A (en) Anti-theft monitoring device and monitoring system for entrance door
CN205230159U (en) Entrance guard's device based on zigBee technique
CN203773681U (en) Power distribution room security and protection system
CN203366408U (en) Multifunctional entrance guard based on function application of FPGA (field programmable gate array) control chip
CN106205025A (en) A kind of intelligent security protection management system
CN104967825A (en) Gatekeeper electronic dog system
US20210217438A1 (en) Door knock access control
CN205080681U (en) Register one's residence door electronic monitoring device
CN103198596A (en) Intelligent network alarm system and implementation method thereof
US20210248884A1 (en) Attempted entry detection
CN103295350A (en) Family anti-theft monitoring device achieved through internet
CN104063969A (en) Access control early warning system and access control early warning control method based on motion detection
CN206115524U (en) Door control system for building
CN106373227A (en) Housing estate door control system
CN203299946U (en) Household anti-theft monitoring device enabled by Internet
CN105427498A (en) Wireless-network household antitheft system and control method thereof
CN112184977A (en) Dynamic face recognition entrance guard attendance system
WO2023280273A1 (en) Control method and system
CN107705409A (en) A kind of concealed intelligent gate control system and its control method
CN205451220U (en) Mechanical and electrical integration intelligence burglary -resisting door system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211231