CN115273369A - Intelligent household security monitoring device and monitoring method thereof - Google Patents

Intelligent household security monitoring device and monitoring method thereof Download PDF

Info

Publication number
CN115273369A
CN115273369A CN202210866485.7A CN202210866485A CN115273369A CN 115273369 A CN115273369 A CN 115273369A CN 202210866485 A CN202210866485 A CN 202210866485A CN 115273369 A CN115273369 A CN 115273369A
Authority
CN
China
Prior art keywords
equipment
local
processor
client
intelligent home
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210866485.7A
Other languages
Chinese (zh)
Inventor
杜晓青
李志立
陈津义
丁超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou Xingyu Automotive Lighting Systems Co Ltd
Original Assignee
Changzhou Xingyu Automotive Lighting Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou Xingyu Automotive Lighting Systems Co Ltd filed Critical Changzhou Xingyu Automotive Lighting Systems Co Ltd
Priority to CN202210866485.7A priority Critical patent/CN115273369A/en
Publication of CN115273369A publication Critical patent/CN115273369A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Emergency Management (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Business, Economics & Management (AREA)
  • Acoustics & Sound (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an intelligent home security monitoring device and a monitoring method thereof, wherein the intelligent home security monitoring device comprises: the local end equipment is arranged at an entrance door, named by a building-unit-house number, and can detect and identify potential dangers and form a warning signal; the client equipment is in wireless communication connection with the local equipment, and can receive the warning signal of the local equipment and perform early warning operation; the server-side equipment is in wireless communication connection with the local-side equipment and the client-side equipment, and can receive the early warning signal of the client-side equipment and the warning signal of the local-side equipment and take measures. The invention can carry out face recognition and continuous action detection through the local end equipment, and when suspicious people or dangerous behaviors are detected, the local end equipment can form warning signals and send the warning signals to the client end equipment and the server end equipment, thereby preventing property loss or personal injury in time and carrying out early warning on potential dangers.

Description

Intelligent household security monitoring device and monitoring method thereof
Technical Field
The invention relates to the technical field of intelligent home, in particular to an intelligent home security monitoring device and a monitoring method thereof.
Background
In modern life, people pay more and more attention to the safety of their lives and properties. At present, a resident generally installs monitoring cameras inside and outside a house to monitor real-time scenes inside and outside the house, and if an accident is found, clues and evidences can be searched according to stored videos. However, only by means of camera monitoring, a house owner needs to pay attention to the camera video all the time to find out a dangerous event and give an alarm manually, police officers perform rescue according to the description of the alarm person, long time is spent in the middle, and if the emergency happens, the best rescue time is even delayed, and irreparable results are caused.
The home security system belongs to a passive and post-investigation type (has hysteresis), mainly looks up video records to look for clues and evidences after problems occur, and cannot prevent property loss and personal injury in advance.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the technical problem that a home security system in the prior art has hysteresis is solved. The invention provides an intelligent home security monitoring device and a monitoring method thereof, which can find dangerous conditions in time and take measures to process immediately without manually staring at a monitoring video in real time, can early warn in advance, and reduce property loss and personal injury of residents.
The technical scheme adopted by the invention for solving the technical problem is as follows: an intelligent home security supervision device, comprising: the system comprises local-end equipment, a remote-end equipment and a remote-end equipment, wherein the local-end equipment is installed at an entrance door and named by a building-unit-house number, and the local-end equipment can detect and identify potential risks and form warning signals;
the client equipment is in wireless communication connection with the local end equipment, and can receive the warning signal of the local end equipment and perform early warning operation;
the server side equipment is in wireless communication connection with the local side equipment, the server side equipment is in wireless communication connection with the client side equipment, and the server side equipment can receive the early warning signal of the client side equipment and the warning signal of the local side equipment and take measures.
Therefore, the local end equipment can be used for face recognition and continuous action detection so as to recognize strangers, specially disguised persons and suspicious dangerous behaviors, and when the suspicious persons or dangerous behaviors are detected, the local end equipment can form warning signals and send the warning signals to the client end equipment and the server end equipment, so that property loss or personal injury can be prevented in time, and potential dangers can be pre-warned.
Further, the local end device includes: the system comprises a singlechip processor, a first communication module, an infrared camera, a microphone and a proximity sensor, wherein the first communication module is connected with the singlechip processor, and the infrared camera is connected with the singlechip processor and used for capturing images of people; the microphone is connected with the single chip microcomputer processor and used for receiving and playing voice signals; the proximity sensor is connected with the single chip microcomputer processor and used for detecting whether a person approaches the proximity sensor.
Further, the local end device further includes: and the database comprises a face database and a voice database.
Further, the single chip processor includes: face identification module, continuous action detection module and speech recognition module, face identification module with infrared camera connects, continuous action detection module with infrared camera connects, speech recognition module with the microphone is connected.
The invention also provides an intelligent home security supervision method, which adopts the intelligent home security supervision device and comprises the following steps:
s1, monitoring the environmental condition of an entrance door in real time through local end equipment, and when potential danger is detected and identified, generating warning signals by the local end equipment and sending the warning signals to client end equipment and server end equipment;
s2, after the client equipment receives the warning signal, corresponding early warning operation is executed;
and S3, after the server side equipment receives the warning signal, measures can be taken to manage and control the site.
Further, in step S1, the local end device monitors the environmental condition at the entrance door in real time, and specifically includes:
the single chip microcomputer processor, the infrared camera and the microphone are in a dormant state by default, and when the proximity sensor senses that a person approaches the entrance door, the single chip microcomputer processor, the infrared camera and the microphone are waken up to enter a working state;
the infrared camera captures a video image of a person and transmits the video image to the single chip processor for face recognition and continuous motion detection;
and the microphone captures a field voice signal and transmits the voice signal to the singlechip processor for voice recognition.
Further, the process of face recognition comprises the following steps:
the single chip processor extracts the face features in the video image and compares the extracted face features with a face library in a database;
if the comparison is successful, no processing is carried out;
if the comparison fails, the human face features are indicated as strangers, and at the moment, if the strangers stay at the entrance door for more than 30 seconds, the single chip microcomputer processor sends warning signals to the client side equipment and the server side equipment.
Further, the continuous motion detection process specifically includes:
the singlechip processor detects whether dangerous behaviors exist in the video image,
if no dangerous behaviors exist, no treatment is carried out;
if dangerous behaviors exist, judging the level of the dangerous behaviors; if the dangerous behavior is high in level, the single chip processor sends out warning signals to the client equipment and the server equipment at the same time; if the dangerous behavior is low in level, the single chip microcomputer processor sends out voice warning through the microphone and sends out warning signals to the client equipment.
Further, the level of the dangerous behavior is defined as:
left-right looking behavior is defined as low-level dangerous behavior,
the behavior of multiple attempts to open the entry lock is defined as high-level dangerous behavior,
the act of violently breaking the entry door is defined as a high level of dangerous act,
the behavior with limb conflict is defined as high-level dangerous behavior,
the act of breaking into the dwelling by violence is defined as a high level of dangerous activity.
Further, the voice recognition process includes: the microphone collects voice data and transmits the voice data to the single-chip processor, the single-chip processor identifies whether the voice data contains a help seeking language or a threat language, and if the help seeking language or the threat language is identified, the single-chip processor sends an alarm signal to the server side equipment.
The invention has the advantages that the local end equipment monitors the conditions inside and outside the house in real time, when dangerous or suspicious conditions are found, the local end equipment can send warning signals to the client end equipment and/or the server end equipment in time, the client end equipment can take early warning measures in time, and the server end equipment can schedule police officers to carry out on-site support in time. The invention integrates early warning, live confirmation and real-time resource scheduling, has high real-time performance and preventability, can find safety threat in time before or at the initial stage of occurrence of a property or personal safety hazard event, controls the threat state in the germination stage and avoids the expansion and the severity of the state.
Drawings
The invention is further illustrated with reference to the following figures and examples.
Fig. 1 is a structural block diagram of an intelligent home security monitoring device according to the present invention.
Fig. 2 is a block diagram of the structure of the local end device of the present invention.
Fig. 3 is a block diagram of the structure of the single-chip processor of the present invention.
Fig. 4 is a schematic diagram of the display contents of the display device of the server of the present invention.
FIG. 5 is a flowchart of a method for supervising the security of the smart home according to the present invention.
Fig. 6 is a flow chart of the face recognition of the present invention.
Fig. 7 is a flow chart of the continuous motion detection of the present invention.
FIG. 8 is a flow chart illustrating speech recognition in accordance with the present invention.
In the figure: 1. a local end device; 2. a client device; 3. a server device; 11. a single chip processor; 12. a first communication module; 13. an infrared camera; 14. a microphone; 15. a proximity sensor; 111. a face recognition module; 112. a continuous motion detection module; 113. and a voice recognition module.
Detailed Description
The present invention will now be described in further detail with reference to the accompanying drawings. These drawings are simplified schematic views illustrating only the basic structure of the present invention in a schematic manner, and thus show only the constitution related to the present invention.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "length," "width," "thickness," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," "clockwise," "counterclockwise," "axial," "radial," "circumferential," and the like are used in the orientations and positional relationships indicated in the drawings for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be considered limiting of the invention. Furthermore, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless otherwise specified.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
As shown in fig. 1, the intelligent home security monitoring device of the present invention includes: the system comprises local-end equipment 1, client-side equipment 2 and server-side equipment 3, wherein the local-end equipment 1 is installed at an entrance, the local-end equipment 1 is named by a building-unit-house number, and the local-end equipment 1 can detect and identify potential dangers and form warning signals; the client device 2 is in wireless communication connection with the local device 1, and the client device 2 can receive the warning signal of the local device 1 and perform early warning operation; the server device 3 is in wireless communication connection with the local device 1, the server device 3 is in wireless communication connection with the client device 2, and the server device 3 can receive the early warning signal of the client device 2 and the warning signal of the local device 1 and take measures.
The invention can carry out face recognition and continuous action detection through the local end equipment 1 so as to recognize strangers, specially disguised persons and suspicious dangerous behaviors, and when the suspicious persons or dangerous behaviors are detected, the local end equipment 1 can form warning signals to be sent to the client end equipment 2 and the server end equipment 3 so as to prevent property loss or personal injury in time and carry out early warning on potential dangers.
As shown in fig. 2 to 3, the local end device 1 includes: the system comprises a singlechip processor 11, a first communication module 12, an infrared camera 13, a microphone 14 and a proximity sensor 15, wherein the first communication module 12 is connected with the singlechip processor 11, and the infrared camera 13 is connected with the singlechip processor 11 and used for capturing a person image; the microphone 14 is connected with the singlechip processor 11 and used for receiving and playing voice signals; the proximity sensor 15 is connected with the singlechip processor 11 and used for detecting whether a person approaches. The local device 1 is named by building-unit-house number, and when a potential danger is found, the client device 2 and the server device 3 can perform accurate early warning according to the device number corresponding to the warning signal. For example, the device number of one unit 202 household in a certain cell can be set to 01010202, and the device number of two units 501 household can be set to 02020501, so that in the same cell, a specific household can be located according to the number of the local device 1. The local end equipment 1 can be installed outside and/or inside a door to monitor the conditions inside and outside a house respectively. The local end device 1 further comprises a database 16, and the database 16 comprises a face database and a voice database. The single chip processor 11 comprises a face recognition module 111, a continuous action detection module 112 and a voice recognition module 113, wherein the face recognition module 111 is connected with the infrared camera 13, the continuous action detection module 112 is connected with the infrared camera 13, and the voice recognition module 113 is connected with the microphone 14.
The client device 2 may include a resident and a guest, which differ in registration information, authentication material, and permissions. The visitor terminal mainly aims at non-owner personnel, such as guests, tenants, takeout personnel, couriers, cleaning personnel, security personnel and the like, the registration of the visitor requires uploading photos and contact ways, and the visitor uses an identity card to carry out real-name authentication, and only has the permission of information registration. The resident end mainly aims at the owner and the family, the registration of the resident needs to upload the account book, the house property certificate and the personal photo, the mission authentication is carried out by using the identity card, the contact telephone is filled in, and the resident has the authority of remote monitoring, user management, repair reporting, alarming, early warning receiving and preference setting. For example, when user management is performed, a resident can perform operations such as addition, deletion, modification, query and the like on family members and visitors; when the local end equipment 2 or the client end equipment 2 breaks down, the resident can report the repair on the client end equipment 2 and track the repair progress; when the local device 1 sends a warning signal to the client device 2, the householder can check the real-time video image on the client device 2 and know whether the possibility of causing property loss or personal injury exists in time, and if the possibility exists, the householder can select to give an alarm to the server device 3 or perform early warning operation; the favorite setting of the resident comprises the selection of the warning words, and different warning words can be set in different scenes. The client device 2 is, for example, a mobile phone, a tablet, or other device, and the resident can take the device with him or her and receive the warning information in time.
The server side equipment 3 can be arranged in a community police room, the server side equipment 3 can be in communication connection with servers of the community police room, the street police room, the district police room and the city police room, the servers are connected with the display equipment and the buzzer, and the display equipment can dynamically display the statistical number and the number of police officers of the local side equipment 1 in real time. The server of the community police office displays statistical data by taking a community as a unit, the server of the street police office displays statistical data by taking the community as a unit, and the like. The police service room of the upper level has the right to check all data information of the police service room of the lower level, and data statistics display is carried out according to the community as a unit, and the rest is done in turn. The upper-level police office can check all data information of the lower-level police office. The functions of all levels of police offices are different, the community police offices are the main responsible persons for security, and are processed by the community police offices in principle when early warning occurs, and the real-time networking requests assistance to the superior level only under the conditions of serious state and insufficient police strength. When the warning is received by the community police room server, the buzzer carries out warning, the warning camera on the display device carries out flicker display, no personnel response is carried out when the warning information exceeds 1 minute, the warning is carried out on the upper-level police room again, and the warning is carried out on the upper-level police room until the warning information is responded by the secondary class. After receiving the remote alarm, the police service room server can check the real-time video image of the local alarm equipment 1 in a linkage manner according to the alarm information, and can perform remote voice call to perform warning and deterrence operations; the police service room server can inquire the distribution of police service executive personnel, and the on-line scheduling is carried out, so that the attendance efficiency is improved. The police service room server can count the number of faults of the local end equipment 1, perform on-line dispatching and progress query, check maintenance tasks and current completion conditions of each worker on line, and perform reasonable division of labor according to the workload of each worker conveniently. For example, fig. 4 shows the display contents of the display device of the community police office, and the information such as the normal number and the alarm number of the local devices 1, the number of persons on duty, and the trouble shooting is clear at a glance.
In other words, the intelligent home security monitoring device provided by the invention has the advantages that the local end equipment 1, the client end equipment 2 and the server end equipment 3 are connected with one another in a networking manner, the local end equipment 1 can monitor the conditions inside and outside the house in real time, once a potential danger is found, the potential danger is immediately reported to the client end equipment 2 and the server end equipment 3, measures are taken in time, dangerous behaviors are prevented, and the personal safety and property safety of residents are guaranteed.
As shown in fig. 5, the present invention further provides an intelligent home security monitoring method, which adopts an intelligent home security monitoring device, and the method includes the following steps:
s1, monitoring the environmental condition of an entrance door in real time through local end equipment 1, and when potential danger is detected and identified, generating a warning signal by the local end equipment 1 and sending the warning signal to client equipment 2 and server equipment 3. And S2, after the client equipment 2 receives the warning signal, executing corresponding early warning operation. And S3, after the server side equipment 3 receives the warning signal, measures can be taken to manage and control the site. In other words, the local device 1 monitors the conditions inside and outside the house in real time, if suspicious conditions or dangerous behaviors are found, a warning signal is immediately formed and sent to the client device 2 and the server device 3, if the danger level is low, the warning signal can be only sent to the client device 2, the client device 2 frightens suspicious people through voice, if the danger level is high, the warning signal can be simultaneously sent to the client device 2 and the server device 3, the client device 2 can send out voice for loud drinking, the server device 2 can assign police officers to go to the site for checking immediately, and management and control measures are taken in time to reduce personal injury and property loss of residents.
In step S1, the local device 1 monitors the environmental condition of the entrance door in real time, and specifically includes: the single chip microcomputer processor 11, the infrared camera 13 and the microphone 14 are in a dormant state by default, and when the proximity sensor 15 senses that a person approaches the entrance door, the single chip microcomputer processor 11, the infrared camera 13 and the microphone 14 are waken up to enter a working state. The infrared camera 13 captures a video image of a person and transmits the video image to the singlechip processor 11 for face recognition and continuous motion detection. The microphone 14 captures the speech signal of the scene and transmits the speech signal to the singlechip processor 11 for speech recognition.
As shown in fig. 6, the process of face recognition includes the following steps: the single chip processor 11 extracts the face features in the video image and compares the extracted face features with a face library in a database; if the comparison is successful, no processing is carried out; if the comparison fails, the face feature is a stranger, and at this time, if the stranger stays at the entrance door for more than 30 seconds, the single chip processor 11 sends a warning signal to the client device 2 and the server device 3. For example, when a person enters the detection range of the infrared camera 13, the infrared camera 13 may capture facial features of the person, and if the extraction of the facial features by the face recognition module 111 of the single chip processor 11 fails due to wearing a hat, a mask, glasses, or other accessories, and the stay time of the person outdoors exceeds 30 seconds, the single chip processor 11 controls the microphone 14 to send a voice alert and alert the client device 2 that a stranger stays at the doorway, where the voice alert is given as "hello, i cannot see your face, do you get lost? I want to inform the host to join together ". If the face recognition module 111 successfully extracts the face features, the extracted face features are compared with a face library in a database, and if the comparison is successful, the person is a resident or a visitor; if the comparison fails, it indicates that the person is a stranger, and at this time, if the stranger stays outdoors for more than 30 seconds, the mcu 11 controls the microphone 14 to send a voice alert and warns the client device 2 that the stranger stays at the doorway, where the voice alert is "you are good, i have not seen you, and ask for something? I have notified the owner that he can see you ", this voice alert is relatively friendly but contains alert implications. The client device 2 receives the warning signal, can check the real-time video image, and then processes the video image according to the actual and real-time conditions. The user can set the content of the voice alert in the client device 2 according to his own preferences.
As shown in fig. 7, the continuous motion detection process specifically includes: the singlechip processor 11 detects whether dangerous behaviors exist in the video image, and if the dangerous behaviors do not exist, no processing is performed; if dangerous behaviors exist, judging the level of the dangerous behaviors; if the level of the dangerous behavior is high, the single chip processor 11 sends out warning signals to the client device 2 and the server device 3 at the same time; if the level of the dangerous behavior is low, the single chip processor 11 sends out a voice alarm through the microphone 14 and sends out an alarm signal to the client device 2. For example, the level of dangerous behavior can be defined as: the behavior of 'looking aside left and right' is defined as low-level dangerous behavior, the behavior of 'attempting to open the entrance door lock for a plurality of times' is defined as high-level dangerous behavior, the behavior of 'violently breaking the entrance door' is defined as high-level dangerous behavior, the behavior of 'having physical conflict' is defined as high-level dangerous behavior, and the behavior of 'violently breaking into the residence' is defined as high-level dangerous behavior. For example, when a person enters the detection range of the infrared camera 13, the continuous motion detection module 112 of the mcu 11 performs video image detection for 30 seconds as a cycle to detect the continuous motion of the person, and if the continuous motion detection module 112 detects at least one of five dangerous behaviors, the processing at different levels is performed according to the level of the dangerous behavior. For example, when a low-level dangerous behavior is detected, the single chip processor 11 sends a voice warning and sends warning information to the client device 2, and after receiving the warning information, the client device 2 can immediately view real-time video images and process the video images according to the field conditions. When a high-level dangerous behavior is detected, the single-chip processor 11 sends a warning signal to the client device 2 and the server device 3 at the same time, after the client device 2 and the server device 3 receive the warning signal, real-time video images can be checked and processed according to the field condition, and the server device 3 can also remotely control the microphone 14 to perform voice warning and deterrence so as to timely stop the dangerous behavior.
As shown in fig. 8, the process of speech recognition includes: the microphone 14 collects voice data and transmits the voice data to the single chip processor 11, the voice recognition module 113 of the single chip processor 11 recognizes whether the voice data contains a help or a threat language, and if the help or the threat language is recognized, the single chip processor 11 sends a warning signal to the server device 3. For example, the distress, threat speech may include: "rescue people" and "rescue me", etc., after the server-side device 3 receives the warning signal, it immediately checks the real-time video image, and locates the position of the local-side device 1 that alarms, and timely dispatches the police service staff to the scene for rescue.
In summary, according to the intelligent home security monitoring apparatus and the monitoring method thereof of the present invention, the local device 1 monitors the conditions inside and outside the house in real time, when a dangerous or suspicious condition is found, the local device 1 can send a warning signal to the client device 2 and/or the server device 3 in time, the client device 2 can take early warning measures in time, and the server device 3 can schedule police officers to support the scene in time. The intelligent home security supervision device integrates early warning, live confirmation and real-time resource scheduling, has high real-time performance and preventability, can timely discover security threats before or at the initial stage of occurrence of property or personal safety hazards, controls threat situations at the initial stage, and avoids situation expansion and aggravation.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the contents of the specification, and must be determined by the scope of the claims.

Claims (10)

1. The utility model provides an intelligent home security supervision device which characterized in that includes:
the system comprises local end equipment (1), wherein the local end equipment (1) is installed at an entrance door, the local end equipment (1) is named by a building-unit-house number, and the local end equipment (1) can detect and identify potential dangers and form warning signals;
the client device (2) is in wireless communication connection with the local device (1), and the client device (2) can receive the warning signal of the local device (1) and perform early warning operation;
the server side equipment (3) is in wireless communication connection with the local side equipment (1), the server side equipment (3) is in wireless communication connection with the client side equipment (2), and the server side equipment (3) can receive the early warning signal of the client side equipment (2) and the warning signal of the local side equipment (1) and take measures.
2. The intelligent home security supervision apparatus according to claim 1, wherein the local device (1) comprises: the system comprises a singlechip processor (11), a first communication module (12), an infrared camera (13), a microphone (14) and a proximity sensor (15), wherein the first communication module (12) is connected with the singlechip processor (11), and the infrared camera (13) is connected with the singlechip processor (11) and used for capturing images of people; the microphone (14) is connected with the singlechip processor (11) and is used for receiving and playing voice signals; the proximity sensor (15) is connected with the single chip microcomputer processor (11) and used for detecting whether a person approaches the proximity sensor.
3. The intelligent home security supervision apparatus according to claim 2, wherein the local device (1) further comprises: a database (16), wherein the database (16) comprises a face database and a voice database.
4. The intelligent home security supervision device according to claim 2, wherein the single-chip processor (11) comprises: face identification module (111), continuous action detection module (112) and speech recognition module (113), face identification module (111) with infrared camera (13) are connected, continuous action detection module (112) with infrared camera (13) are connected, speech recognition module (113) with microphone (14) are connected.
5. An intelligent home security supervision method, which is characterized in that the intelligent home security supervision device according to any one of claims 1-4 is adopted, and the method comprises the following steps:
s1, monitoring the environmental condition of an entrance door in real time through local end equipment (1), and when potential danger is detected and identified, generating a warning signal by the local end equipment (1) and sending the warning signal to client equipment (2) and server equipment (3);
s2, after the client equipment (2) receives the warning signal, corresponding early warning operation is executed;
and S3, after the server side equipment (3) receives the warning signal, measures can be taken to manage and control the site.
6. The intelligent home security supervision method according to claim 5, wherein in step S1, the local device (1) monitors the environmental conditions at the entrance door in real time, and specifically comprises:
the single chip microcomputer processor (11), the infrared camera (13) and the microphone (14) are in a dormant state by default, and when the proximity sensor (15) senses that a person approaches the entrance door, the single chip microcomputer processor (11), the infrared camera (13) and the microphone (14) are waken up to enter a working state;
the infrared camera (13) captures a video image of a person and transmits the video image to the single chip microcomputer processor (11) for face recognition and continuous motion detection;
and the microphone (14) captures a field voice signal and transmits the voice signal to the singlechip processor (11) for voice recognition.
7. The intelligent home security supervision method according to claim 6, wherein the face recognition process comprises the following steps:
the single chip microcomputer processor (11) extracts the face features in the video image and compares the extracted face features with a face library in a database;
if the comparison is successful, no treatment is carried out;
if the comparison fails, the human face features are indicated as strangers, and at the moment, if the strangers stay at the entrance door for more than 30 seconds, the single-chip processor (11) sends warning signals to the client equipment (2) and the server equipment (3).
8. The intelligent home security supervision method according to claim 6, wherein the continuous action detection process specifically comprises the following steps:
the singlechip processor (11) detects whether dangerous behaviors exist in the video image,
if no dangerous behaviors exist, no treatment is carried out;
if dangerous behaviors exist, judging the level of the dangerous behaviors; if the level of the dangerous behaviors is high, the single chip microcomputer processor (11) sends out warning signals to the client device (2) and the server device (3) at the same time; if the dangerous behavior is low in level, the singlechip microcomputer processor (11) sends out voice warning through the microphone (14) and sends out a warning signal to the client equipment (2).
9. The intelligent home security supervision method according to claim 8, wherein the level of the dangerous behavior is defined as:
left-right looking behavior is defined as low-level dangerous behavior,
the behavior of multiple attempts to open the entry lock is defined as high-level dangerous behavior,
the act of violently breaking the entry is defined as a high level of dangerous act,
a behavior with limb conflict is defined as a high-level dangerous behavior,
the act of breaking down violence into the residence is defined as a high level of dangerous activity.
10. The intelligent home security supervision method according to claim 6, wherein the voice recognition process comprises: the microphone (14) collects voice data and transmits the voice data to the single chip microcomputer processor (11), the single chip microcomputer processor (11) identifies whether the voice data contain a help seeking language or a threat language, and if the help seeking language or the threat language is identified, the single chip microcomputer processor (11) sends an alarm signal to the server side equipment (3).
CN202210866485.7A 2022-07-22 2022-07-22 Intelligent household security monitoring device and monitoring method thereof Pending CN115273369A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210866485.7A CN115273369A (en) 2022-07-22 2022-07-22 Intelligent household security monitoring device and monitoring method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210866485.7A CN115273369A (en) 2022-07-22 2022-07-22 Intelligent household security monitoring device and monitoring method thereof

Publications (1)

Publication Number Publication Date
CN115273369A true CN115273369A (en) 2022-11-01

Family

ID=83767936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210866485.7A Pending CN115273369A (en) 2022-07-22 2022-07-22 Intelligent household security monitoring device and monitoring method thereof

Country Status (1)

Country Link
CN (1) CN115273369A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117975605A (en) * 2024-01-22 2024-05-03 北京摇光智能科技有限公司 Electronic lock operation method, system, terminal and storage medium
CN118015771A (en) * 2024-04-09 2024-05-10 贵州商学院 Burglar alarm with active warning function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150221209A1 (en) * 2014-02-05 2015-08-06 Honeywell International Inc. System and method of alerting cms and registered users about a potential duress situation using a mobile application
CN107958562A (en) * 2016-10-14 2018-04-24 浩思八方科技(北京)有限公司 A kind of household safe Active Defending System Against and method
CN108494641A (en) * 2018-03-28 2018-09-04 合肥隆延科技有限公司 The control method of intelligent domestic system based on Internet of Things
CN112383615A (en) * 2020-11-12 2021-02-19 山东建筑大学 Residential building entrance guard security system and method based on edge calculation
CN113538827A (en) * 2021-07-12 2021-10-22 陕西科技大学 Intelligent home monitoring system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150221209A1 (en) * 2014-02-05 2015-08-06 Honeywell International Inc. System and method of alerting cms and registered users about a potential duress situation using a mobile application
CN107958562A (en) * 2016-10-14 2018-04-24 浩思八方科技(北京)有限公司 A kind of household safe Active Defending System Against and method
CN108494641A (en) * 2018-03-28 2018-09-04 合肥隆延科技有限公司 The control method of intelligent domestic system based on Internet of Things
CN112383615A (en) * 2020-11-12 2021-02-19 山东建筑大学 Residential building entrance guard security system and method based on edge calculation
CN113538827A (en) * 2021-07-12 2021-10-22 陕西科技大学 Intelligent home monitoring system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117975605A (en) * 2024-01-22 2024-05-03 北京摇光智能科技有限公司 Electronic lock operation method, system, terminal and storage medium
CN118015771A (en) * 2024-04-09 2024-05-10 贵州商学院 Burglar alarm with active warning function

Similar Documents

Publication Publication Date Title
US11785146B2 (en) Doorbell call center
CN109064698B (en) Resident security early warning method and resident security early warning system
US10885734B2 (en) Scalable systems and methods for monitoring and concierge service
CN103268680B (en) A kind of family intelligent monitoring burglary-resisting system
CN107666604A (en) A kind of wired home wireless video monitoring system
CN104021362A (en) Access control pre-warning system and pre-warning control method based on image dynamic object identification
CN101681397A (en) Remote monitoring system and method thereof
CN116457851B (en) System and method for real estate monitoring
CN109870918A (en) A kind of home-use intelligent monitor system
CN106096566B (en) Security identification system and method supporting image input retrieval, identification and track description
CN110335437A (en) A kind of wisdom house security system based on block chain
CN115273369A (en) Intelligent household security monitoring device and monitoring method thereof
CN106331658A (en) Cellphone remote video monitoring anti-theft system based on wireless network
CN212933288U (en) Safety control platform system for intelligent elevator
CN105185017A (en) Family security system based on infrared induction and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination