CN113870508A - Intelligent security gateway arming and disarming method combining facial recognition - Google Patents
Intelligent security gateway arming and disarming method combining facial recognition Download PDFInfo
- Publication number
- CN113870508A CN113870508A CN202111130335.1A CN202111130335A CN113870508A CN 113870508 A CN113870508 A CN 113870508A CN 202111130335 A CN202111130335 A CN 202111130335A CN 113870508 A CN113870508 A CN 113870508A
- Authority
- CN
- China
- Prior art keywords
- security gateway
- user
- information
- personnel
- intelligent security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 230000001815 facial effect Effects 0.000 title claims description 32
- 238000004891 communication Methods 0.000 claims abstract description 20
- 230000007123 defense Effects 0.000 claims abstract description 8
- 238000001514 detection method Methods 0.000 claims abstract description 6
- 230000002618 waking effect Effects 0.000 claims abstract description 5
- 238000013473 artificial intelligence Methods 0.000 claims description 11
- 238000013475 authorization Methods 0.000 claims description 9
- 238000012544 monitoring process Methods 0.000 claims description 7
- 230000003203 everyday effect Effects 0.000 claims description 6
- 230000009471 action Effects 0.000 claims description 3
- 238000004140 cleaning Methods 0.000 claims description 3
- 230000008921 facial expression Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000010191 image analysis Methods 0.000 description 3
- 230000004075 alteration Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
- G08B13/19615—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion wherein said pattern is defined by the user
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Abstract
The invention discloses a defense deploying and withdrawing method of an intelligent security gateway in combination with face identification, which comprises an integrated intelligent security gateway device, wherein a system single chip, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna are arranged in the integrated intelligent security gateway device, the 4G/5G LTE communication module, the Sub1GHz RF, the 2.4G/5GHz WIFI and the Bluetooth are connected with the system single chip signal and the antenna signal, the integrated intelligent security gateway device is a security gateway, an object is detected through a distance Sensor, a camera is awakened after the object is detected, and face detection and identification are carried out; judging whether the user is an authorized user or not, judging the user is an unknown user if the user is not authorized, warning an administrator user and returning to the security gateway to standby, if the user is authorized, waking up the security gateway to be backlight, starting the security gateway to operate and authorize, and sending an event notice to the mobile phone APP and the security cloud.
Description
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a method for arming and disarming an intelligent security gateway by combining facial recognition.
Background
At present, the arming and disarming of similar products are all performed in a mode of inputting passwords on an intelligent gateway, and hierarchical partitioned arming and disarming management is not performed by combining image analysis of facial recognition. The password is easy to leak, and any person can easily remove the security management system after stealing the password and cause the risk of property loss.
Disclosure of Invention
The present invention provides a method for arming and disarming an intelligent security gateway by combining face recognition, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: intelligent security gateway that combines facial discernment includes integrated intelligent security gateway device, its characterized in that: the integrated intelligent security gateway device is characterized in that a system single chip, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna are arranged inside the integrated intelligent security gateway device, the 4G/5GLTE communication module, the Sub1GHz RF, the 2.4G/5GHz WIFI are connected with system single chip signals and antenna signals, and the integrated intelligent security gateway device is a security gateway.
Preferably, the security gateway includes treater, memory, distance sensor, artificial intelligence engine, embedded camera, radio frequency communication module, functional module, the supporting APP that uses of security gateway, through 4G/5G LTE communication module and APP high in the clouds remote connection.
Preferably, the output ends of the distance sensor, the embedded camera, the radio frequency communication module and the function module are electrically connected with the input end of the processor, the other output end of the embedded camera is electrically connected with the input end of the memory, the output end of the processor is electrically connected with the input ends of the memory and the artificial intelligence engine, and the processor compares the image in the memory with the acquired image entry similarity through calling the image in the memory and the artificial intelligence engine.
Preferably, the method for arming and disarming the intelligent security gateway by combining facial recognition comprises the following steps:
s1, pre-registering the facial features of each user of the family, and setting different defense and use authorities for different user identities;
s2, besides the face features of family members, the face features of relatives and friends can be set, a group is set for the members except the family members separately, and different defense and use authorities are set for the personnel identities in the group;
s21, when recording, it can preset various facial expressions or actions, such as binding, putting up, holding and binding, etc, the grouping can be named as "holding mode", when the security system catches the signal, it can alarm automatically;
s22 temporary mode, firstly, the householder collects the information of the personnel who need to enter the room regularly in advance through image collection, such as the cleaning personnel employed by the householder, and the like, so that the householder can enter the room to carry out various works when not at home, and then the householder carries out the regular operation through the control terminal, namely the temporary working time is set, on one hand, the working efficiency of the personnel entering the room can be improved, and the work can be completed in a specific time; on the other hand, in order to reduce the waiting time of temporary external personnel indoors and avoid the loss of the temporary personnel to the householder, in a specific working time, when the householder receives a network signal and knows that the temporary personnel enter the house, partial facilities in the house can be controlled to be closed through a remote wireless signal, namely, disarming is carried out, the temporary personnel are prevented from mistakenly touching the indoor security alarm, the closed security alarm does not contain monitoring video content, other time periods do not pass through facial recognition, when the temporary personnel do not work any more, old user information can be deleted through the gateway, and when the user with the deleted information uses the facial recognition again, the user with the deleted information does not pass through the opening;
s23 temporary supervision mode, in outdoor monitoring equipment, the doorway is monitored and information is collected without shutting down, the collected information is the character information staying in front of the main door of the house every day and is stored, when the information collected by the system is approximately the same every day, no action is taken, when the collected information is strange or appears in front of the main door of the house for the first time, or when the collected information is temporary and stays in front of the door for a long time, the information collection system uploads the collected information to the gateway and transmits the information to the owner for the first time to warn, the owner can remotely control the user information to temporarily collect, sets corresponding authority through the mobile phone terminal, sets marshalling, the temporarily collected user information can be marshalled to be the marshalling of common users, temporary personnel, unwelpful people and the like, when the user information is collected again next time, the early warning is not sent out after the first two groups are grouped, the early warning is sent out after the third group is started, a user can change the previously recorded information groups through a terminal, and the set authority can be updated to the authority of the latest grouped member after the change;
s3 automatically identifies different users and records the operation records of the different users on the intelligent security gateway, and manages and controls the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users.
Preferably, the specific steps of step S3 are as follows:
s31 the security gateway stands by, detects an object through the distance sensor, wakes up the camera after detecting the object, and then carries out face detection and identification;
s32, judging whether the user is an authorized user or not, judging the user to be an unknown user if the user is not, warning an administrator user and returning to the security gateway to wait for yes, waking up the security gateway to be back-lighted, starting the security gateway to operate and authorize, sending an event notice to the mobile phone APP and the security cloud, and then ending and waiting for the security gateway.
Preferably, in the step S32, when the determination result is yes, the two cases are divided into two cases, one case is that the family member is authenticated as yes, and the other case is that the friends and family are authenticated as yes, in this step, the processor calls the image in the memory, and also calls the information of the group where the image is located, when the family member is authenticated, automatically wakes up the security gateway backlight, starts the security gateway operation authorization, when the group authentication of friends and family is yes, the security gateway backlight and the related security gateway operation cannot be woken up, and sends an event notification to the mobile phone APP and the security cloud, and when the mobile phone terminal agrees, the security gateway backlight can be woken up, and the security gateway operation authorization is started.
Compared with the prior art, the invention has the beneficial effects that:
1. the intelligent security gateway arming and disarming method combining facial recognition comprises the steps that when facial features of all users of a family are registered in advance, and different arming and using authorities are set for identities of different users, the system can automatically match and record operation information of the users aiming at the intelligent security gateway, arming and disarming of different protection areas and different protection degrees are carried out through the facial recognition, meanwhile, when unregistered operators approach or touch the intelligent security gateway, messages with images are sent to managers in real time to carry out prevention warning, a warning passes through a distance sensor to detect an object, a camera is awakened after the used object is detected, then facial detection and recognition are carried out, and the intelligent security gateway is realized.
2. The intelligent security gateway arming and disarming method combining facial recognition can also bind other equipment in the house, such as a safety box intelligent lock, is connected to a mobile phone terminal through Bluetooth and a communication module in the intelligent security gateway, can control personnel capable of opening a coded lock through setting authority, and can ensure that the house and the office are safe and intelligent.
Drawings
FIG. 1 is a system on a chip, Proximity sensors, Image Sensor,4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and antenna, through an internal artificial intelligence processor and an Image analysis algorithm to construct a complete architecture diagram for system application;
FIG. 2 is a diagram of a user registration process, in which a camera built in an intelligent security gateway device obtains a face image of a user, facial features are extracted by an image analysis technique to achieve application of facial recognition, and different usage permission diagrams are set for different users;
FIG. 3 is a schematic diagram of a system flow when the intelligent security gateway detects that an object is approaching;
FIG. 4 is a flowchart illustrating the operation of the system when the intelligent security gateway detects that an object is approaching;
FIG. 5 is a schematic diagram of a system flow of the intelligent security gateway when detecting that an unauthorized user operates the intelligent security gateway;
fig. 6 is a schematic flow chart of a system for the intelligent security gateway temporary visitor.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b): referring to fig. 1-6, the present invention provides a technical solution: an intelligent security gateway combining face identification comprises an integrated intelligent security gateway device, a system single chip is arranged inside the integrated intelligent security gateway device, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna, the 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, the Bluetooth is connected with the system single chip signal and the antenna signal, and the integrated intelligent security gateway device is a security gateway.
The security gateway comprises a processor, a memory, a distance sensor, an artificial intelligence engine, an embedded camera, a radio frequency communication module and a functional module, wherein the security gateway is matched with an APP and is remotely connected with the APP in a cloud side through a 4G/5GLTE communication module.
The output ends of the distance sensor, the embedded camera, the radio frequency communication module and the functional module are electrically connected with the input end of the processor, the other output end of the embedded camera is electrically connected with the input end of the memory, the output end of the processor is electrically connected with the input ends of the memory and the artificial intelligence engine, and the processor compares the images in the memory with the acquired image entry similarity through calling the images in the memory and the artificial intelligence engine.
The intelligent security gateway arming and disarming method combining facial recognition comprises the following steps:
s1, pre-registering the facial features of each user of the family, and setting different defense and use authorities for different user identities;
s2, besides the face features of family members, the face features of relatives and friends can be set, a group is set for the members except the family members separately, and different defense and use authorities are set for the personnel identities in the group;
s21, when recording, it can preset various facial expressions or actions, such as binding, putting up, holding and binding, etc, the grouping can be named as "holding mode", when the security system catches the signal, it can alarm automatically;
s22 temporary mode, firstly, the householder collects the information of the personnel who need to enter the room regularly in advance through image collection, such as the cleaning personnel employed by the householder, and the like, so that the householder can enter the room to carry out various works when not at home, and then the householder carries out the regular operation through the control terminal, namely the temporary working time is set, on one hand, the working efficiency of the personnel entering the room can be improved, and the work can be completed in a specific time; on the other hand, in order to reduce the waiting time of temporary external personnel indoors and avoid the loss of the temporary personnel to the householder, in a specific working time, when the householder receives a network signal and knows that the temporary personnel enter the house, partial facilities in the house can be controlled to be closed through a remote wireless signal, namely, disarming is carried out, the temporary personnel are prevented from mistakenly touching the indoor security alarm, the closed security alarm does not contain monitoring video content, other time periods do not pass through facial recognition, when the temporary personnel do not work any more, old user information can be deleted through the gateway, and when the user with the deleted information uses the facial recognition again, the user with the deleted information does not pass through the opening;
s23 temporary supervision mode, in outdoor monitoring equipment, the doorway is monitored and information is collected without shutting down, the collected information is the character information staying in front of the main door of the house every day and is stored, when the information collected by the system is approximately the same every day, no action is taken, when the collected information is strange or appears in front of the main door of the house for the first time, or when the collected information is temporary and stays in front of the door for a long time, the information collection system uploads the collected information to the gateway and transmits the information to the owner for the first time to warn, the owner can remotely control the user information to temporarily collect, sets corresponding authority through the mobile phone terminal, sets marshalling, the temporarily collected user information can be marshalled to be the marshalling of common users, temporary personnel, unwelpful people and the like, when the user information is collected again next time, the early warning is not sent out after the first two groups are grouped, the early warning is sent out after the third group is started, a user can change the previously recorded information groups through a terminal, and the set authority can be updated to the authority of the latest grouped member after the change;
s3 automatically identifies different users and records the operation records of the different users on the intelligent security gateway, and manages and controls the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users.
The specific steps of step S3 are as follows:
s31 the security gateway stands by, detects an object through the distance sensor, wakes up the camera after detecting the object, and then carries out face detection and identification;
s32, judging whether the user is an authorized user or not, judging the user to be an unknown user if the user is not, warning an administrator user and returning to the security gateway to wait for yes, waking up the security gateway to be back-lighted, starting the security gateway to operate and authorize, sending an event notice to the mobile phone APP and the security cloud, and then ending and waiting for the security gateway.
In the present embodiment, the first and second electrodes are,
in the step S32, when the determination result is yes, the authentication of the family member is yes, and the authentication of the family member and the authentication of the friends and relatives are yes, in this step, the processor calls the image in the memory, and also calls the information of the group in which the image is located, when the family member is, automatically wakes up the security gateway backlight, starts the security gateway operation authorization, when the group authentication of the friends and relatives is yes, the security gateway backlight and the related security gateway operation cannot be woken up, and sends an event notification to the mobile phone APP and the security cloud, and when the mobile phone terminal agrees, the security gateway backlight can be woken up, and the security gateway operation authorization is started.
The working principle is as follows: firstly, the facial features of each user of a family need to be registered in advance, and different defense deployment and use authorities are set for the identities of different users; automatically identifying different users, recording operation records of the different users on the intelligent security gateway, and managing and controlling the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users;
the security gateway waits for orders, detects an object through a distance sensor, wakes up a camera after detecting the object, and then carries out face detection and identification; judging whether the user is an authorized user or not, judging whether the user is an unknown user or not, warning an administrator user and returning to the security gateway to stand by, if so, waking up the security gateway backlight, starting the security gateway operation authorization, sending an event notice to a mobile phone APP and a security cloud, and then ending, standing by the security gateway, wherein when the judgment result is yes, the two cases are divided into two cases, one case is that a family member is authenticated as yes, and the other case is that friends and relatives are authenticated as yes, in the step, a processor calls an image in a memory, the information of a group where the image is located is also called, when the family member is, the security gateway backlight is automatically waken up, the security gateway operation authorization is started, when the authentication of friends and relatives is yes, the security gateway backlight and related security gateway operation cannot be waken up, and the event notice is sent to the mobile phone APP and the security cloud, the security gateway backlight can be awakened only under the condition that the mobile phone terminal agrees to start the security gateway for operation authorization, meanwhile, other devices in the house can be bound by the intelligent security gateway, such as a safe intelligent lock, the intelligent security gateway is connected to the mobile phone terminal through Bluetooth and a communication module inside the intelligent security gateway, and the personnel capable of opening the coded lock can be controlled through setting authority, so that the safety and the intelligence of the house and the office can be better achieved.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (6)
1. Intelligent security gateway that combines facial discernment includes integrated intelligent security gateway device, its characterized in that: the integrated intelligent security gateway device is characterized in that a system single chip, Proximity sensors, Image sensors, a 4G/5G LTE communication module, Sub1GHz RF,2.4G/5GHz WIFI, Bluetooth and an antenna are arranged inside the integrated intelligent security gateway device, the 4G/5G LTE communication module, the Sub1GHz RF, the 2.4G/5GHz WIFI and the Bluetooth are connected with the system single chip signal and the antenna signal, and the integrated intelligent security gateway device is a security gateway.
2. The intelligent security gateway combined with facial recognition as claimed in claim 1, wherein: the security gateway comprises a processor, a memory, a distance sensor, an artificial intelligence engine, an embedded camera, a radio frequency communication module and a functional module, wherein the security gateway is matched with an APP and is remotely connected with the APP in a cloud mode through a 4G/5G LTE communication module.
3. The intelligent security gateway combined with facial recognition as claimed in claim 2, wherein: the output ends of the distance sensor, the embedded camera, the radio frequency communication module and the functional module are electrically connected with the input end of the processor, the other output end of the embedded camera is electrically connected with the input end of the memory, the output end of the processor is electrically connected with the input ends of the memory and the artificial intelligence engine, and the processor compares the image in the memory with the acquired image entry similarity through calling the image in the memory and the artificial intelligence engine.
4. An intelligent security gateway arming and disarming method combining facial recognition is characterized by comprising the following steps:
s1, pre-registering the facial features of each user of the family, and setting different defense and use authorities for different user identities;
s2, besides the face features of family members, the face features of relatives and friends can be set, a group is set for the members except the family members separately, and different defense and use authorities are set for the personnel identities in the group;
s21, when recording, it can preset various facial expressions or actions, such as binding, putting up, holding and binding, etc, the grouping can be named as "holding mode", when the security system catches the signal, it can alarm automatically;
s22 temporary mode, firstly, the householder collects the information of the personnel who need to enter the room regularly in advance through image collection, such as the cleaning personnel employed by the householder, and the like, so that the householder can enter the room to carry out various works when not at home, and then the householder carries out the regular operation through the control terminal, namely the temporary working time is set, on one hand, the working efficiency of the personnel entering the room can be improved, and the work can be completed in a specific time; on the other hand, in order to reduce the waiting time of temporary external personnel indoors and avoid the loss of the temporary personnel to the householder, in a specific working time, when the householder receives a network signal and knows that the temporary personnel enter the house, partial facilities in the house can be controlled to be closed through a remote wireless signal, namely, disarming is carried out, the temporary personnel are prevented from mistakenly touching the indoor security alarm, the closed security alarm does not contain monitoring video content, other time periods do not pass through facial recognition, when the temporary personnel do not work any more, old user information can be deleted through the gateway, and when the user with the deleted information uses the facial recognition again, the user with the deleted information does not pass through the opening;
s23 temporary supervision mode, in outdoor monitoring equipment, monitoring and information collecting are carried out on doorways without shutting down, the collected information is the character information staying in front of a main door of a house every day and is stored, when the collected information of the system is approximately the same every day, no action is taken, when strange people or people staying in front of the main door of the house are collected, or when temporary personnel stay in front of the door for a long time, the collected information is uploaded to a gateway by the information collection system and is transmitted to a householder for the first time to carry out early warning, the householder can remotely control and temporarily collect user information, sets corresponding authorities through a mobile phone terminal, and sets grouping at the same time;
s3 automatically identifies different users and records the operation records of the different users on the intelligent security gateway, and manages and controls the arming and disarming authority of the different users on various security sensors of different types aiming at the authority of different users.
5. The method for arming and disarming an intelligent security gateway with face recognition according to claim 4, wherein the step S3 includes the following steps:
s31 the security gateway stands by, detects an object through the distance sensor, wakes up the camera after detecting the object, and then carries out face detection and identification;
s32, judging whether the user is an authorized user or not, judging the user to be an unknown user if the user is not, warning an administrator user and returning to the security gateway to wait for yes, waking up the security gateway to be back-lighted, starting the security gateway to operate and authorize, sending an event notice to the mobile phone APP and the security cloud, and then ending and waiting for the security gateway.
6. The method of claim 5, wherein the intelligent security gateway arming and disarming with facial recognition comprises: in the step S32, when the determination result is yes, the authentication of the family member is yes, and the authentication of the friends and relatives is yes, in this step, the processor calls the image in the memory, and also calls the information of the group where the image is located, when the family member is, automatically wakes up the security gateway backlight, starts the security gateway operation authorization, when the group authentication of the friends and relatives is yes, the security gateway backlight and the related security gateway operation cannot be woken up, and sends an event notification to the mobile phone APP and the security cloud, and when the mobile phone terminal agrees, the security gateway backlight can be woken up, and the security gateway operation authorization is started.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111130335.1A CN113870508A (en) | 2021-09-26 | 2021-09-26 | Intelligent security gateway arming and disarming method combining facial recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111130335.1A CN113870508A (en) | 2021-09-26 | 2021-09-26 | Intelligent security gateway arming and disarming method combining facial recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113870508A true CN113870508A (en) | 2021-12-31 |
Family
ID=78994755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111130335.1A Pending CN113870508A (en) | 2021-09-26 | 2021-09-26 | Intelligent security gateway arming and disarming method combining facial recognition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113870508A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114699005A (en) * | 2022-03-08 | 2022-07-05 | 向道全 | Intelligent tissue machine that possesses theftproof function |
CN115439971A (en) * | 2022-08-31 | 2022-12-06 | 中国工商银行股份有限公司 | Self-service bank access control monitoring management method and system |
CN115550615A (en) * | 2022-11-28 | 2022-12-30 | 云丁网络技术(北京)有限公司 | Video recording method and device for intelligent equipment, electronic equipment and storage medium |
CN116543484A (en) * | 2023-06-14 | 2023-08-04 | 广东维信智联科技有限公司 | Two-way checking anti-decoding system based on secret cabinet |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108510704A (en) * | 2018-05-22 | 2018-09-07 | 华翔翔能(湖南)能源科技有限公司 | A kind of office's safety protection method |
CN208126627U (en) * | 2018-04-20 | 2018-11-20 | 成都安密电子系统工程有限公司 | A kind of multipurpose safety alarm monitoring terminal |
CN111768580A (en) * | 2020-06-30 | 2020-10-13 | 上海上实龙创智能科技股份有限公司 | Indoor anti-theft system and anti-theft method based on edge gateway |
CN212624326U (en) * | 2020-08-03 | 2021-02-26 | 深圳金智凌轩视讯技术有限公司 | Intelligent recognition alarm system |
CN113507408A (en) * | 2021-06-09 | 2021-10-15 | 深圳市智天物联科技有限公司 | Intelligent security gateway arming and disarming method combining facial recognition |
-
2021
- 2021-09-26 CN CN202111130335.1A patent/CN113870508A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN208126627U (en) * | 2018-04-20 | 2018-11-20 | 成都安密电子系统工程有限公司 | A kind of multipurpose safety alarm monitoring terminal |
CN108510704A (en) * | 2018-05-22 | 2018-09-07 | 华翔翔能(湖南)能源科技有限公司 | A kind of office's safety protection method |
CN111768580A (en) * | 2020-06-30 | 2020-10-13 | 上海上实龙创智能科技股份有限公司 | Indoor anti-theft system and anti-theft method based on edge gateway |
CN212624326U (en) * | 2020-08-03 | 2021-02-26 | 深圳金智凌轩视讯技术有限公司 | Intelligent recognition alarm system |
CN113507408A (en) * | 2021-06-09 | 2021-10-15 | 深圳市智天物联科技有限公司 | Intelligent security gateway arming and disarming method combining facial recognition |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114699005A (en) * | 2022-03-08 | 2022-07-05 | 向道全 | Intelligent tissue machine that possesses theftproof function |
CN115439971A (en) * | 2022-08-31 | 2022-12-06 | 中国工商银行股份有限公司 | Self-service bank access control monitoring management method and system |
CN115550615A (en) * | 2022-11-28 | 2022-12-30 | 云丁网络技术(北京)有限公司 | Video recording method and device for intelligent equipment, electronic equipment and storage medium |
CN115550615B (en) * | 2022-11-28 | 2023-07-21 | 云丁网络技术(北京)有限公司 | Video recording method and device of intelligent equipment, electronic equipment and storage medium |
CN116543484A (en) * | 2023-06-14 | 2023-08-04 | 广东维信智联科技有限公司 | Two-way checking anti-decoding system based on secret cabinet |
CN116543484B (en) * | 2023-06-14 | 2023-12-22 | 广东维信智联科技有限公司 | Two-way checking anti-decoding system based on secret cabinet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11785146B2 (en) | Doorbell call center | |
CN113870508A (en) | Intelligent security gateway arming and disarming method combining facial recognition | |
CN107023224B (en) | Door lock opening control method and system based on active security | |
CN108412315B (en) | Intelligent door lock warning system and control method thereof | |
CN202257879U (en) | Intelligentized safety monitoring system for residential area | |
CN105279872A (en) | Anti-theft monitoring device and monitoring system for entrance door | |
CN205230159U (en) | Entrance guard's device based on zigBee technique | |
CN203773681U (en) | Power distribution room security and protection system | |
CN203366408U (en) | Multifunctional entrance guard based on function application of FPGA (field programmable gate array) control chip | |
CN106205025A (en) | A kind of intelligent security protection management system | |
CN104967825A (en) | Gatekeeper electronic dog system | |
US20210217438A1 (en) | Door knock access control | |
CN205080681U (en) | Register one's residence door electronic monitoring device | |
CN103198596A (en) | Intelligent network alarm system and implementation method thereof | |
US20210248884A1 (en) | Attempted entry detection | |
CN103295350A (en) | Family anti-theft monitoring device achieved through internet | |
CN104063969A (en) | Access control early warning system and access control early warning control method based on motion detection | |
CN206115524U (en) | Door control system for building | |
CN106373227A (en) | Housing estate door control system | |
CN203299946U (en) | Household anti-theft monitoring device enabled by Internet | |
CN105427498A (en) | Wireless-network household antitheft system and control method thereof | |
CN112184977A (en) | Dynamic face recognition entrance guard attendance system | |
WO2023280273A1 (en) | Control method and system | |
CN107705409A (en) | A kind of concealed intelligent gate control system and its control method | |
CN205451220U (en) | Mechanical and electrical integration intelligence burglary -resisting door system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211231 |