CN114023052A - Alarm method, alarm device, storage medium and electronic device - Google Patents

Alarm method, alarm device, storage medium and electronic device Download PDF

Info

Publication number
CN114023052A
CN114023052A CN202111301220.4A CN202111301220A CN114023052A CN 114023052 A CN114023052 A CN 114023052A CN 202111301220 A CN202111301220 A CN 202111301220A CN 114023052 A CN114023052 A CN 114023052A
Authority
CN
China
Prior art keywords
target
association
type
behavior
target device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111301220.4A
Other languages
Chinese (zh)
Inventor
赵标伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202111301220.4A priority Critical patent/CN114023052A/en
Publication of CN114023052A publication Critical patent/CN114023052A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Emergency Management (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the invention provides an alarm method, an alarm device, a storage medium and an electronic device, wherein the method comprises the following steps: acquiring a target image acquired in a target area, wherein the target image comprises a first object, target equipment used by the first object and a second object; determining a behavior type of the first object based on the target image; determining whether the first object and the incidence relation between the target device and the second object meet a preset condition or not under the condition that the behavior type is a first type; and executing the alarm operation under the condition that the association relation does not meet the preset condition. By the method and the device, the problem that the existing risk event cannot be timely alarmed in the related technology is solved, and the effect of timely alarming when the risk behavior is found is achieved.

Description

Alarm method, alarm device, storage medium and electronic device
Technical Field
The embodiment of the invention relates to the field of communication, in particular to an alarm method, an alarm device, a storage medium and an electronic device.
Background
In the related art, the existing monitoring system only carries out simple video recording, and looks back through a mode of calling and monitoring after a risk-existing event occurs.
Therefore, the problem that the existing risk event cannot be alarmed in time exists in the related technology.
In view of the above problems in the related art, no effective solution has been proposed
Disclosure of Invention
The embodiment of the invention provides an alarming method, an alarming device, a storage medium and an electronic device, which at least solve the problem that the existing risk event cannot be alarmed in time in the related technology.
According to an embodiment of the present invention, there is provided an alarm method including: acquiring a target image acquired in a target area, wherein the target image comprises a first object, target equipment used by the first object and a second object; determining a behavior type of the first object based on the target image; determining whether the first object and the incidence relation between the target device and the second object meet a preset condition or not when the behavior type is a first type; and executing an alarm operation under the condition that the association relation does not meet a preset condition.
According to another embodiment of the present invention, there is provided an alarm device including: the device comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a target image acquired in a target area, and the target image comprises a first object, target equipment used by the first object and a second object; a first determination module to determine a behavior type of the first object based on the target image; a second determining module, configured to determine whether the first object and an association relationship between the target device and the second object satisfy a predetermined condition if the behavior type is a first type; and the alarm module executes alarm operation under the condition that the incidence relation does not meet the preset condition.
According to yet another embodiment of the invention, there is also provided a computer-readable storage medium having a computer program stored therein, wherein the computer program, when executed by a processor, implements the steps of the method as set forth in any of the above.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the method and the device, the target image collected in the target area is obtained, wherein the target image comprises the first object, the target equipment used by the first object and the second object, the behavior type of the first object is determined according to the target image, whether the incidence relation between the first object and the target equipment and the second object meets the preset condition or not is determined under the condition that the behavior type is the first type, and the alarm operation is executed under the condition that the incidence relation does not meet the preset condition. The incidence relation between the first object and the target equipment and the second object can be determined through the target image, and the warning operation is executed under the condition that the incidence relation does not meet the preset condition, so that the timely warning when the risk behavior is found is realized, the problem that the warning cannot be timely carried out on the risk event in the related technology can be solved, and the timely warning effect when the risk behavior is found is achieved.
Drawings
Fig. 1 is a block diagram of a hardware structure of a mobile terminal of an alarm method according to an embodiment of the present invention;
FIG. 2 is a flow chart of an alerting method according to an embodiment of the present invention;
FIG. 3 is a diagram of a system for implementing an alarm method according to an embodiment of the present invention;
fig. 4 is a block diagram of the alarm device according to the embodiment of the present invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings in conjunction with the embodiments.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the embodiments of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking the operation on the mobile terminal as an example, fig. 1 is a hardware structure block diagram of the mobile terminal of an alarm method according to an embodiment of the present invention. As shown in fig. 1, the mobile terminal may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), and a memory 104 for storing data, wherein the mobile terminal may further include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used for storing computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the alarm method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the above-mentioned method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
In this embodiment, an alarm method is provided, and fig. 2 is a flowchart of an alarm method according to an embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, acquiring a target image acquired in a target area, wherein the target image comprises a first object, target equipment used by the first object and a second object;
step S204, determining the behavior type of the first object based on the target image;
step S206, under the condition that the behavior type is a first type, determining whether the first object and the incidence relation between the target device and the second object meet a preset condition;
and step S208, executing an alarm operation under the condition that the association relation does not meet the preset condition.
In this embodiment, the warning method can be applied to a school doorway, a tutor doorway, an old activity center doorway, and the like. The old and the children belong to the vulnerable group and need vehicle delivery service. Some lawbreakers can pretend to be family members or friends of the vulnerable groups, and can cheat or even force the family members or friends to get on the bus, thereby causing personal and property damage to the family members or friends. Therefore, when the first object and the association relation between the target device and the second object are determined not to meet the preset conditions, the warning operation is timely executed, and the second object can be prevented from being cheated.
In the above embodiments, the second object may be a student, a kindergarten child, an elderly person, or the like. The first object may be a person to pick up the second object and the target device may be a motor vehicle, non-motor vehicle, etc. driven by the first object, or a device that can prove the identity of the first object, e.g. a pick-up card with a specific identification, etc. The above method may also be applied to a pet management structure, a pet hospital, etc., and when applied to a pet management structure, a pet hospital, etc. in a place related to a pet, the second object may be a pet.
In the above embodiment, the behavior type may include a delivery behavior type and a take-over behavior type. The first type may be a walk-through type, and when the behavior type of the first object is the walk-through type, the association relationship between the first object and the target device and the second object needs to be determined, and the first object is allowed to walk through the second object when the association relationship satisfies a predetermined condition. And executing the alarm operation under the condition that the association relation does not meet the preset condition. Wherein the predetermined condition may be that the first object and/or the second object are associated.
Optionally, the main body of the above steps may be a background processor, or other devices with similar processing capabilities, and may also be a machine integrated with at least an image acquisition device and a data processing device, where the image acquisition device may include a graphics acquisition module such as a camera, and the data processing device may include a terminal such as a computer and a mobile phone, but is not limited thereto.
According to the method and the device, the target image collected in the target area is obtained, wherein the target image comprises the first object, the target equipment used by the first object and the second object, the behavior type of the first object is determined according to the target image, whether the incidence relation between the first object and the target equipment and the second object meets the preset condition or not is determined under the condition that the behavior type is the first type, and the alarm operation is executed under the condition that the incidence relation does not meet the preset condition. Because the incidence relation between the first object and the target equipment and the second object can be determined through the target image, and the warning operation is executed under the condition that the incidence relation does not meet the preset condition, the timely warning when the risk behaviors are found is realized, therefore, the problem that the warning cannot be timely carried out on the risk events can be solved, and the timely warning effect when the risk behaviors are found is achieved.
In one exemplary embodiment, determining whether the first object and the association of the target device with the second object satisfy a predetermined condition includes: acquiring an associated file stored in a file library and associated with the second object; determining that the association relation satisfies the predetermined condition when the first object is an object included in the association profile or the target device is a device included in the association profile; determining that the association relation does not satisfy the predetermined condition in a case where the first object and the target device are not included in the association profile. In this embodiment, when determining whether the association relation satisfies the predetermined condition, the association profile stored in the profile repository in association with the second object may be acquired. And when the first object or the target equipment is the object or the equipment recorded in the association archive, determining that the association relation meets a preset condition. And determining that the association relation does not meet a predetermined condition under the condition that the first object and the target equipment are not included in the association profile. Wherein, the archive library is the archive recorded when the second object is archived and registered. Upon second object profiling registration, a plurality of associated objects and associated devices may be entered. For example, when a student enters a school, an association profile may be established that includes information about the addressee and the addressee. The information includes, but is not limited to, a picture of the face of the person, the number of the recipient's license plate, the number of the recipient in the organization (e.g., student number, tutor organization card number, etc.), a phone number, etc. And when the first object is the number plate number of the receiver in the associated file or the target equipment is the receiver in the associated file, determining that the association relation meets the preset condition without alarming.
In one exemplary embodiment, performing the alert operation includes at least one of: executing sound alarm operation; sending a reminding signal to a management object which is less than a preset distance away from the second object; and sending a verification request carrying the target image to a target terminal, wherein the verification request is used for requesting the target terminal to verify the validity of the first object and/or the target equipment based on the target image. In this embodiment, when the warning operation is performed, an audio warning operation may be performed, for example, an alarm sound is played or a voice broadcast is performed. The voice broadcast may be to broadcast information such as clothing characteristics, sex, and location of the first object and a name of the second object whose association does not satisfy a predetermined condition, for example, to broadcast "a man wearing black clothing in a certain area, please go to XXX to learn later, wait for authentication", and the like. By broadcasting the information of clothes characteristics, gender, position and the like and the name of the second object, people around can be quickly positioned to the first object and the second object, and the safety of the second object is ensured.
In the above embodiment, the alerting operation may further comprise sending a reminder to a management object that is less than a predetermined distance from the second object. The management object may be a security officer, a teacher or other responsible person, etc. For example, a reminder message may be included to the security personnel closest to the second object, where the reminder message includes the name of the second object, the current location, and the clothing characteristics, gender, location, etc. of the first object. After receiving the alert, the management object may verify the identity information of the first object to ensure the security of the second object.
In the above embodiment, the alarm operation may further include sending a verification request carrying the target image to the target terminal to request the target terminal to verify the validity of the first object and/or the target device based on the target image. Wherein the target terminal may be a terminal of an object associated with the second object. In the case where it is determined that the association does not satisfy the predetermined condition, the target image may be transmitted to a terminal of an object associated with the second object, such as a mobile phone. An object associated with the second object is requested to verify the legitimacy of the first object and/or the target device. I.e. to request the object associated with the second object to confirm whether the first object is allowed to take over the second object.
In an exemplary embodiment, after sending the verification request carrying the target image to the target terminal, the method further includes: receiving a verification result returned by the target terminal; in the case that the verification result indicates that the types of the first object and the target device are untrusted types, marking the first object and the target device; in the event that the verification result indicates that the type of the first object and/or the target device is a trusted type, storing the first object and the target device into an association profile associated with the second object. In this embodiment, after sending the verification request to the target terminal, the verification result returned by the target terminal may be received. And in the case that the verification result indicates that the types of the first object and the target device are the non-trusted type, marking the first object and the target device, and performing an acoustic alarm operation and/or sending a reminding signal to a management object which is less than a preset distance away from the second object. When the first object and the target device appear in the target area again, the monitoring interface can display an identifier to remind workers to pay attention to the first object and the target object.
In the above embodiment, where the verification result indicates that the first object and/or the target device is of a trusted type, the first object and target device stored values are in an association profile associated with the second object. That is, the relationship between the receiver and the receiver is statistically learned, and the relationship between the receiver and the receiver is confirmed by a certain rule.
In an exemplary embodiment, after the association does not satisfy a predetermined condition, the method further includes: counting a first number of times the first object completes the first type of behavior within a predetermined time; counting a second number of times the first object completes a second type of behavior within a predetermined time; in the event that the first number and/or the second number is greater than a first predetermined threshold, storing the first object into an association profile associated with the second object. In this embodiment, the first type of behavior may be a pick-up behavior and the second type of behavior may be a delivery behavior. If the first object arrives by sending the second object, a certain trust relationship may exist between the first object and the second object, a first predetermined threshold may be set, and when the number of times of sending the second object by the first object exceeds the first predetermined threshold, the trust relationship between the first object and the second object is confirmed, and the authentication is successful. If the first object returns after being connected with the second object, a certain trust relationship may exist between the first object and the second object, and when the number of times of connecting the first object with the second object exceeds a first preset threshold, the trust relationship between the first object and the second object is confirmed, and the authentication is successful. Or, when the first number and the second number simultaneously satisfy the condition that the first number and the second number are larger than a first preset threshold value, the trust relationship between the first number and the second number is confirmed, and the authentication is successful. And if the authentication is successful, the target equipment is stored in the associated archive.
In an exemplary embodiment, after the association does not satisfy a predetermined condition, the method further includes: counting a third time of the target equipment in completing the behavior corresponding to the first type within a preset time; counting the fourth times of the target equipment in the preset time when the second type of corresponding behavior is completed; in the event that the third number and/or the fourth number is greater than a second predetermined threshold, storing the target device in an association profile associated with the second object. In this embodiment, the first type of behavior may be a pick-up behavior and the second type of behavior may be a delivery behavior. If the target device sends the second object to arrive, a certain trust relationship may exist between the target device and the second object, a second predetermined threshold value may be set, and when the number of times of sending the second object by the target device exceeds the second predetermined threshold value, the trust relationship between the target device and the second object is confirmed, and the authentication is successful. If the target device returns after receiving the second object, a certain trust relationship may exist between the target device and the second object, and when the number of times that the target device receives the second object exceeds a second predetermined threshold, the trust relationship between the target device and the second object is confirmed, and the authentication is successful. Or, when the first number and the second number simultaneously satisfy the condition that the first number and the second number are larger than a first preset threshold value, the trust relationship between the first number and the second number is confirmed, and the authentication is successful. And if the authentication is successful, the target equipment is stored in the associated archive.
In an exemplary embodiment, after determining whether the first object and the association relationship of the target device and the second object satisfy a predetermined condition, the method further includes: monitoring the first object and the target device in real time; capturing the first object and the target device in case a predetermined behavior occurs. In this embodiment, the predetermined behavior may include that the vehicle is about to get on, is getting on, and is getting on, that is, the first object and the target device may be captured before, during, and after getting on, respectively, for evidence obtaining and archiving.
In one exemplary embodiment, the method further comprises: sending an association file determining request to a terminal of an object associated with a second object according to a preset time period, wherein the association file determining request comprises an associated object and associated equipment which are included in a current association file, and the association file determining request is used for requesting the object associated with the second object to determine whether the current association file needs to be modified or not; and receiving confirmation information sent by the terminal, and adjusting the current associated file based on the confirmation information. In this embodiment, the associated object and the associated device included in the current association profile may be sent to the terminal of the object associated with the second object according to a predetermined time period, and the object associated with the second object may adjust the object and the device in the current association profile, for example, delete a certain object or device.
The following describes the alarm method with reference to the specific embodiment:
fig. 3 is a structural diagram of an execution system of an alarm method according to an embodiment of the present invention, and as shown in fig. 3, the system includes: an authentication module 32, a detection and identification module 34, and an alarm snapshot module 36.
The authentication module mainly completes the entry and authentication of the recipient (corresponding to the first object and the target device) and the recipient information (corresponding to the second object). The entered information includes but is not limited to a face photograph, a number of the recipient's license plate, the number of the recipient in the organization (e.g., student number, tutor organization card number, etc.), a cell phone number, etc.
The entry mode comprises manual entry and automatic entry.
The manual entry means that initially, information of a receiver and a receiver is actively entered, and the authentication binding relationship between the receiver and the receiver is verified by an organization (such as a school, a tutor organization, and the like).
The automatic input means that the relation between the receiver and the receiver can be statistically learned through the detection and identification module, and the relation between the receiver and the receiver can be confirmed through a certain rule.
The relevant rules are exemplified as follows:
rule 1: if ID1 sends ID2 to arrive, a certain trust relationship may exist between ID1 and ID2, a threshold value may be set, and when the number of times that ID1 sends ID2 exceeds the threshold value, the trust relationship between the two is confirmed, and the authentication is successful.
Rule 2: if ID1 returns by ID2, a certain trust relationship may exist between ID1 and ID2, a threshold may be set, and when the number of times that ID1 receives ID2 exceeds the threshold, the trust relationship between the two is confirmed, and the authentication is successful.
Rule 3: the rule 1 and the rule 2 may be in a logical relationship with each other, or may be in a logical relationship with each other, and may be selected according to requirements.
The identification detection module mainly completes face identification and license plate identification of the receiver and the receiver, and both can be used as unique IDs.
When DI1 and ID2 arrive in the same vehicle and someone gets off the vehicle, then tag ID1 and ID2 are identified as delivery actions, the person or vehicle itself in the vehicle is returned, the tag is identified as the recipient, and the remaining person is identified as the recipient.
When the ID1 arrives by driving, the ID2 enters the vehicle and drives away, then the marks ID1 and ID2 are recognized as the pick-up behavior, the mark ID1 is recognized as the receiver, and the mark ID2 is recognized as the receiver.
And the detection identification module needs to transmit the receiving and sending behaviors and the ID information identified by the detection identification module to the authentication module and the alarm snapshot module respectively.
The alarm snapshot module mainly completes the alarm prompt function and snapshot evidence obtaining function of the dangerous receiving and sending behaviors. The alarm snapshot module synthesizes the recorded data of the authentication module and the receiving and sending behaviors identified by the detection and identification module, judges whether the receiving and sending behaviors are safe or not, if the relation between the receiver and the receiver of the receiving and sending behaviors passes the data verification of the authentication module, the receiving and sending behaviors are considered to be normal receiving and sending behaviors, and if not, the receiving and sending behaviors are considered to be dangerous receiving and sending behaviors. And all receiving and sending behaviors need to be snapshot and recorded, and three pictures are taken in a snapshot mode, namely pictures in front of a vehicle, in the process of getting on the vehicle and pictures after getting on the vehicle. Aiming at dangerous receiving and delivering behaviors, an alarm event needs to be generated, and an organization and an emergency contact are notified to rescue at the first time.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, a warning device is further provided, and the warning device is used to implement the foregoing embodiments and preferred embodiments, which have already been described and are not described again. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 4 is a block diagram of a warning device according to an embodiment of the present invention, and as shown in fig. 4, the device includes:
an obtaining module 42, configured to obtain a target image acquired in a target area, where the target image includes a first object, a target device used by the first object, and a second object;
a first determination module 44 for determining a behavior type of the first object based on the target image;
a second determining module 46, configured to determine whether the first object and the association relationship between the target device and the second object satisfy a predetermined condition if the behavior type is a first type;
and the alarm module 48 executes alarm operation under the condition that the association relation does not meet the preset condition.
The first determining module 44 and the second determining module 46 correspond to the identification detecting module, and the warning module 48 corresponds to the alarm capturing module.
In an exemplary embodiment, the second determining module 46 may determine whether the first object and the association relationship of the target device and the second object satisfy a predetermined condition by: acquiring an associated file stored in a file library and associated with the second object; determining that the association relation satisfies the predetermined condition when the first object is an object included in the association profile or the target device is a device included in the association profile; determining that the association relation does not satisfy the predetermined condition in a case where the first object and the target device are not included in the association profile.
In an exemplary embodiment, the alert module 48 may perform the alert operation by at least one of: executing sound alarm operation; sending a reminding signal to a management object which is less than a preset distance away from the second object; and sending a verification request carrying the target image to a target terminal, wherein the verification request is used for requesting the target terminal to verify the validity of the first object and/or the target equipment based on the target image.
In an exemplary embodiment, the apparatus may be configured to receive a verification result returned by a target terminal after sending a verification request carrying the target image to the target terminal; in the case that the verification result indicates that the types of the first object and the target device are untrusted types, marking the first object and the target device; in the event that the verification result indicates that the type of the first object and/or the target device is a trusted type, storing the first object and the target device into an association profile associated with the second object.
In an exemplary embodiment, the apparatus may be further configured to count a first number of times that the first object completes the first type of behavior within a predetermined time after the association relation does not satisfy a predetermined condition; counting a second number of times the first object completes a second type of behavior within a predetermined time; in the event that the first number and/or the second number is greater than a first predetermined threshold, storing the first object into an association profile associated with the second object.
In an exemplary embodiment, the apparatus may be further configured to count a third number of times that the target device occurs in completing the behavior corresponding to the first type within a predetermined time after the association relation does not satisfy a predetermined condition; counting the fourth times of the target equipment in the preset time when the second type of corresponding behavior is completed; in the event that the third number and/or the fourth number is greater than a second predetermined threshold, storing the target device in an association profile associated with the second object.
In an exemplary embodiment, the apparatus may be further configured to monitor the first object and the target device in real time after determining whether the association relationship between the first object and the target device and the second object satisfies a predetermined condition; capturing the first object and the target device in case a predetermined behavior occurs.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Embodiments of the present invention also provide a computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the method as set forth in any of the above.
In an exemplary embodiment, the computer-readable storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
In an exemplary embodiment, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
For specific examples in this embodiment, reference may be made to the examples described in the above embodiments and exemplary embodiments, and details of this embodiment are not repeated herein.
It will be apparent to those skilled in the art that the various modules or steps of the invention described above may be implemented using a general purpose computing device, they may be centralized on a single computing device or distributed across a network of computing devices, and they may be implemented using program code executable by the computing devices, such that they may be stored in a memory device and executed by the computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into various integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An alert method, comprising:
acquiring a target image acquired in a target area, wherein the target image comprises a first object, target equipment used by the first object and a second object;
determining a behavior type of the first object based on the target image;
determining whether the first object and the incidence relation between the target device and the second object meet a preset condition or not when the behavior type is a first type;
and executing an alarm operation under the condition that the association relation does not meet the preset condition.
2. The method of claim 1, wherein determining whether the first object and the association of the target device with the second object satisfy a predetermined condition comprises:
acquiring an associated file stored in a file library and associated with the second object;
determining that the association relation satisfies the predetermined condition when the first object is an object included in the association profile or the target device is a device included in the association profile;
determining that the association relation does not satisfy the predetermined condition in a case where the first object and the target device are not included in the association profile.
3. The method of claim 1, wherein performing an alert operation comprises at least one of:
executing sound alarm operation;
sending a reminding signal to a management object which is less than a preset distance away from the second object;
and sending a verification request carrying the target image to a target terminal, wherein the verification request is used for requesting the target terminal to verify the validity of the first object and/or the target equipment based on the target image.
4. The method of claim 3, wherein after sending a verification request carrying the target image to a target terminal, the method further comprises:
receiving a verification result returned by the target terminal;
in the case that the verification result indicates that the types of the first object and the target device are untrusted types, marking the first object and the target device;
in the event that the verification result indicates that the type of the first object and/or the target device is a trusted type, storing the first object and the target device into an association profile associated with the second object.
5. The method according to claim 1, wherein after the association relation does not satisfy a predetermined condition, the method further comprises:
counting a first number of times the first object completes the first type of behavior within a predetermined time;
counting a second number of times the first object completes a second type of behavior within a predetermined time;
in the event that the first number and/or the second number is greater than a first predetermined threshold, storing the first object into an association profile associated with the second object.
6. The method according to claim 1, wherein after the association relation does not satisfy a predetermined condition, the method further comprises:
counting a third time of the target equipment in completing the behavior corresponding to the first type within a preset time;
counting the fourth times of the target equipment in the preset time when the second type of corresponding behavior is completed;
in the event that the third number and/or the fourth number is greater than a second predetermined threshold, storing the target device in an association profile associated with the second object.
7. The method of claim 1, wherein after determining whether the first object and the association of the target device with the second object satisfy a predetermined condition, the method further comprises:
monitoring the first object and the target device in real time;
capturing the first object and the target device in case a predetermined behavior occurs.
8. An alert device, comprising:
the device comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a target image acquired in a target area, and the target image comprises a first object, target equipment used by the first object and a second object;
a first determination module to determine a behavior type of the first object based on the target image;
a second determining module, configured to determine whether the first object and an association relationship between the target device and the second object satisfy a predetermined condition if the behavior type is a first type;
and the alarm module executes alarm operation under the condition that the incidence relation does not meet the preset condition.
9. A computer-readable storage medium, in which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 7.
CN202111301220.4A 2021-11-04 2021-11-04 Alarm method, alarm device, storage medium and electronic device Pending CN114023052A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111301220.4A CN114023052A (en) 2021-11-04 2021-11-04 Alarm method, alarm device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111301220.4A CN114023052A (en) 2021-11-04 2021-11-04 Alarm method, alarm device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN114023052A true CN114023052A (en) 2022-02-08

Family

ID=80061790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111301220.4A Pending CN114023052A (en) 2021-11-04 2021-11-04 Alarm method, alarm device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN114023052A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115170135A (en) * 2022-05-25 2022-10-11 浙江大华技术股份有限公司 Financial counter transaction control method, system, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008299728A (en) * 2007-06-01 2008-12-11 Chudenko Corp Monitoring system
CN109344271A (en) * 2018-09-30 2019-02-15 南京物盟信息技术有限公司 Video portrait records handling method and its system
CN110148234A (en) * 2019-04-24 2019-08-20 浙江安防职业技术学院 Campus brush face picks exchange method, storage medium and system
CN110309756A (en) * 2019-06-25 2019-10-08 深圳市三宝创新智能有限公司 A kind of kindergarten picks management method
CN112348731A (en) * 2021-01-07 2021-02-09 广州格鲁信息技术有限公司 Smart community real-time supervision system and method based on big data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008299728A (en) * 2007-06-01 2008-12-11 Chudenko Corp Monitoring system
CN109344271A (en) * 2018-09-30 2019-02-15 南京物盟信息技术有限公司 Video portrait records handling method and its system
CN110148234A (en) * 2019-04-24 2019-08-20 浙江安防职业技术学院 Campus brush face picks exchange method, storage medium and system
CN110309756A (en) * 2019-06-25 2019-10-08 深圳市三宝创新智能有限公司 A kind of kindergarten picks management method
CN112348731A (en) * 2021-01-07 2021-02-09 广州格鲁信息技术有限公司 Smart community real-time supervision system and method based on big data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115170135A (en) * 2022-05-25 2022-10-11 浙江大华技术股份有限公司 Financial counter transaction control method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US20210289332A1 (en) Rules-Based Ride Security
US11336637B2 (en) Using social graph for account recovery
CN103248534B (en) Safeguard system for kindergarten
CN107680230A (en) The testimony of a witness based on recognition of face veritifies and the clearance system of blacklist review
WO2020151339A1 (en) Abnormality processing method and apparatus based on unmanned vehicle, and related devices
CN105184881A (en) Method, apparatus, server and system for identifying user identity
US20040153553A1 (en) System and method for use of mobile wireless devices for authentication of personal identification and registration with security network
CN108040295A (en) Many sanction methods, server, user terminal and many sanction systems
CN105453069A (en) Situational crowd-sourced response system
CN108846922A (en) Cloud monitoring method, Cloud Server and computer readable storage medium
US20230308881A1 (en) System and method for encounter identity verification
KR101515943B1 (en) System Managing going to School Using Mobile Device Management and Method thereof
US20210339755A1 (en) Driving state monitoring device, driving state monitoring method, and driving state monitoring system
CN114023052A (en) Alarm method, alarm device, storage medium and electronic device
CN107483544A (en) A kind of intelligent movable monitoring system and monitoring method
KR101664556B1 (en) Social security network method and system
CN114071060B (en) Intelligent remote comment supervision system
CN217113324U (en) Supervision system for garbage classification quality
CN109831445A (en) A kind of emergency call method, system, equipment and storage medium
CN113011421A (en) Community security management system based on big data
CN211349449U (en) Intelligent access control system
US20170330459A1 (en) People Management System
CN111428635A (en) Information warning method, device, storage medium and electronic device
KR20160032462A (en) Social security network method and system using a social network service
KR20140019260A (en) How to prevent and respond to individual targets of crime using mobile networks and how to share information with law enforcement authorities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination