CN116453284A - Security alarm device and method based on dispelling equipment - Google Patents

Security alarm device and method based on dispelling equipment Download PDF

Info

Publication number
CN116453284A
CN116453284A CN202310711609.9A CN202310711609A CN116453284A CN 116453284 A CN116453284 A CN 116453284A CN 202310711609 A CN202310711609 A CN 202310711609A CN 116453284 A CN116453284 A CN 116453284A
Authority
CN
China
Prior art keywords
target
dispelling
abnormal
security
security area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310711609.9A
Other languages
Chinese (zh)
Other versions
CN116453284B (en
Inventor
王理想
王明用
王文星
黄瑞华
谢建省
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shengxun Electronic Technology Co ltd
Original Assignee
Guangzhou Shengxun Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shengxun Electronic Technology Co ltd filed Critical Guangzhou Shengxun Electronic Technology Co ltd
Priority to CN202310711609.9A priority Critical patent/CN116453284B/en
Publication of CN116453284A publication Critical patent/CN116453284A/en
Application granted granted Critical
Publication of CN116453284B publication Critical patent/CN116453284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses a security alarm device and a security alarm method based on dispelling equipment, wherein the security alarm device comprises the following steps: the acquisition module is used for acquiring real-time monitoring data acquired by monitoring equipment corresponding to the security area; the judging module is used for judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data; and the control module is used for controlling target dispelling equipment of the security area to perform alarm processing and/or dispelling processing when the judging module judges that the security area has an abnormal target. Therefore, when the monitoring equipment monitors an abnormal target with abnormal invasion, the corresponding dispelling equipment is controlled to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security and protection are too dependent on subjective activity of monitoring personnel are reduced, the reliability of security and protection is improved, and the life safety and property safety of people are guaranteed.

Description

Security alarm device and method based on dispelling equipment
Technical Field
The invention relates to the technical field of intelligent security, in particular to a security alarm device and method based on dispelling equipment.
Background
In real life, people usually need to arrange corresponding monitoring devices in key places of life, study and work, and special monitoring personnel view monitoring videos collected by monitoring equipment in real time so as to timely inform security personnel for processing after illegal invading personnel are found, so that life safety and property safety of people are guaranteed. However, it is found in practice that the above security mode too depends on subjective activity of the monitoring personnel, if the physical or mental state of the monitoring personnel is poor, the working attitude is relatively negative, or the monitoring personnel leaves the seat, peripheral abnormal conditions may not be found in time, and the security reliability is reduced. It is important to see how to improve the security reliability so as to ensure the life safety and property safety of people.
Disclosure of Invention
The invention aims to solve the technical problem of providing a security alarm device and a security alarm method based on dispelling equipment, which can improve the security reliability so as to ensure the life safety and property safety of people.
In order to solve the technical problems, the first aspect of the invention discloses a security alarm method based on dispelling equipment, which comprises the following steps:
Acquiring real-time monitoring data of a security area, which are acquired by monitoring equipment corresponding to the security area;
judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
and when the judgment result is yes, controlling the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing, wherein the alarm processing is used for reminding the existence of the abnormal target in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area.
As an optional implementation manner, in the first aspect of the present invention, before controlling the dispelling device corresponding to the security area to perform dispelling processing on the abnormal target, the method further includes:
based on the real-time monitoring data, analyzing the real-time invasion condition of the abnormal target to obtain a first analysis result;
determining emergency attributes matched with the abnormal targets according to the first analysis result;
generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute;
the target dispelling device for controlling the security area carries out alarm processing and/or dispelling processing, and the method comprises the following steps:
Based on the alarm control parameters, controlling the target dispelling equipment to alarm related personnel in the security area so as to remind the security area of the abnormal target; and/or the number of the groups of groups,
and controlling the target dispelling equipment to carry out dispelling processing on the abnormal target based on the dispelling control parameter so as to drive the abnormal target to leave the security area.
As an optional implementation manner, in the first aspect of the present invention, the first analysis result includes one or more of first location information of the abnormal target, first number information of the abnormal target, and first attribute information of the abnormal target;
determining an emergency attribute matched with the abnormal target according to the first analysis result, wherein the emergency attribute comprises;
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining emergency attributes matched with the abnormal targets according to the hazard degree parameters, wherein the emergency attributes comprise alarm attributes and/or dispersing attributes, the dispersing attributes comprise one or more of dispersing modes matched with the abnormal targets, dispersing intensities matched with the abnormal targets and dispersing space information matched with the abnormal targets, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal targets, dispersing tracks matched with the abnormal targets and dispersing ranges matched with the abnormal targets.
In a first aspect of the present invention, when the target dissipating device of the security area includes a non-contact dissipating device based on fluctuation, the generating, according to the emergency attribute, a dissipating control parameter that matches the target dissipating device of the security area includes:
determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device as a dispersing control parameter of the target dispersing device; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
As an alternative embodiment, in the first aspect of the present invention, the method further includes:
judging whether a target to be protected exists in the peripheral range of the abnormal target or not based on the real-time monitoring data;
when the existence of the target to be protected in the peripheral range is judged, analyzing the real-time situation of the target to be protected based on the real-time monitoring data to obtain a second analysis result;
and updating the emergency attribute according to the second analysis result, and triggering and executing the operation of generating the alarm control parameter and/or the dispersion control parameter matched with the target dispersion equipment of the security area according to the emergency attribute.
As an optional implementation manner, in the first aspect of the present invention, the second analysis result includes one or more of second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
and updating the emergency attribute according to the second analysis result, including:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected caused by the abnormal target and/or the severity degree of threat to the target to be protected caused by target dispelling equipment in the security area when dispelling the abnormal target;
And updating the emergency attribute according to the risk degree parameter.
As an optional implementation manner, in the first aspect of the present invention, before the target dispelling device controlling the security area performs the alarm processing and/or the dispelling processing, the method further includes:
judging whether the abnormal target meets preset processing conditions according to the intrusion time information of the abnormal target, wherein the preset processing conditions comprise preset alarm conditions and/or preset dispelling conditions;
when judging that the abnormal target meets the preset processing condition, triggering and executing the target dispelling equipment for controlling the security area to perform alarm processing and/or dispelling processing;
wherein, according to the intrusion time information of the abnormal target, judging whether the abnormal target meets a preset processing condition, including:
judging whether the invasion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the invasion time information comprises the invasion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
The second aspect of the invention discloses a security alarm device based on dispelling equipment, which comprises:
the acquisition module is used for acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area;
the judging module is used for judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
the control module is used for controlling target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing when the judging module judges that the abnormal target exists in the security area, wherein the alarm processing is used for reminding that the abnormal target exists in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area.
As an alternative embodiment, in the second aspect of the present invention, the apparatus further includes:
the analysis module is used for analyzing the real-time invasion condition of the abnormal target based on the real-time monitoring data before the control module controls the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing, so as to obtain a first analysis result;
The determining module is used for determining emergency attributes matched with the abnormal targets according to the first analysis result;
the generation module is used for generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute;
the specific mode of the control module for controlling the target dispelling equipment in the security area to carry out alarm processing and/or dispelling processing comprises the following steps:
based on the alarm control parameters, controlling the target dispelling equipment to alarm related personnel in the security area so as to remind the security area of the abnormal target; and/or the number of the groups of groups,
and controlling the target dispelling equipment to carry out dispelling processing on the abnormal target based on the dispelling control parameter so as to drive the abnormal target to leave the security area.
As an optional implementation manner, in the second aspect of the present invention, the first analysis result includes one or more of first location information of the abnormal target, first number information of the abnormal target, and first attribute information of the abnormal target;
the determining module determines a specific mode of the emergency attribute matched with the abnormal target according to the first analysis result, and the specific mode comprises the following steps:
Determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining emergency attributes matched with the abnormal targets according to the hazard degree parameters, wherein the emergency attributes comprise alarm attributes and/or dispersing attributes, the dispersing attributes comprise one or more of dispersing modes matched with the abnormal targets, dispersing intensities matched with the abnormal targets and dispersing space information matched with the abnormal targets, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal targets, dispersing tracks matched with the abnormal targets and dispersing ranges matched with the abnormal targets.
In a second aspect of the present invention, when the target dissipating device of the security area includes a non-contact dissipating device based on fluctuation, the generating module generates, according to the emergency attribute, a specific manner of the dissipating control parameter matched with the target dissipating device of the security area, where the specific manner includes:
Determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device as a dispersing control parameter of the target dispersing device; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
As an optional implementation manner, in the second aspect of the present invention, the judging module is further configured to judge whether a target to be protected exists in a peripheral range of the abnormal target based on the real-time monitoring data;
the analysis module is further configured to, when the judgment module judges that the target to be protected exists in the peripheral range, analyze a real-time situation of the target to be protected based on the real-time monitoring data, and obtain a second analysis result;
The apparatus further comprises:
and the updating module is used for updating the emergency attribute according to the second analysis result and triggering and executing the operation of generating the alarm control parameter and/or the dispersion control parameter matched with the target dispersion equipment of the security area according to the emergency attribute.
As an optional implementation manner, in the second aspect of the present invention, the second analysis result includes one or more of second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
and the specific mode of updating the emergency attribute by the updating module according to the second analysis result comprises the following steps:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected caused by the abnormal target and/or the severity degree of threat to the target to be protected caused by target dispelling equipment in the security area when dispelling the abnormal target;
and updating the emergency attribute according to the risk degree parameter.
As an optional implementation manner, in the second aspect of the present invention, the judging module is further configured to judge, according to intrusion time information of the abnormal target, whether the abnormal target meets a preset processing condition before the control module controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing; when the abnormal target meets the preset processing condition, triggering the control module to execute the operation of controlling the target dispelling equipment of the security area to perform alarm processing and/or dispelling processing, wherein the preset processing condition comprises a preset alarm condition and/or a preset dispelling condition;
the judging module judges whether the abnormal target meets a specific mode of a preset processing condition according to the invasion time information of the abnormal target, and comprises the following steps:
judging whether the invasion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the invasion time information comprises the invasion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
The third aspect of the invention discloses another security alarm device based on dispelling equipment, which comprises:
a memory storing executable program code;
a processor coupled to the memory;
the processor calls the executable program codes stored in the memory to execute the security alarm method based on the dispelling equipment disclosed in the first aspect of the invention.
A fourth aspect of the present invention discloses a computer storage medium storing computer instructions for executing the security alarm method based on the dispelling device disclosed in the first aspect of the present invention when the computer instructions are called.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the real-time monitoring data of the security area, which is acquired by the monitoring equipment corresponding to the security area, is acquired; judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area; and when the judgment result is yes, controlling the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing. Therefore, when the monitoring equipment monitors an abnormal target with abnormal invasion, the corresponding dispelling equipment is controlled to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security and protection are too dependent on subjective activity of monitoring personnel are reduced, the reliability of security and protection is improved, and the life safety and property safety of people are guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a security alarm method based on dispelling equipment, disclosed in an embodiment of the invention;
FIG. 2 is a schematic flow chart of another security alarm method based on dispelling equipment disclosed in the embodiment of the invention;
FIG. 3 is a schematic view of a security alarm method based on dispelling equipment according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security alarm device based on dispelling equipment according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of another security alarm device based on dispelling equipment according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a security alarm device based on a dispelling device according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first, second and the like in the description and in the claims and in the above-described figures are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, apparatus, article, or article that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or article.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The invention discloses a security alarm device and a security alarm method based on dispelling equipment, which can control corresponding dispelling equipment to alarm and dispelling when monitoring equipment monitors an abnormal target with abnormal invasion, so that the occurrence of situations that peripheral abnormal situations cannot be found in time and security personnel cannot arrive at a site to process due to the fact that security is too dependent on subjective motility of monitoring personnel is reduced, the security reliability is improved, and the life safety and property safety of people are guaranteed. The following will describe in detail.
Example 1
Referring to fig. 1, fig. 1 is a schematic flow chart of a security alarm method based on dispelling equipment according to an embodiment of the present invention. The security alarm method based on the dispelling device described in fig. 1 may be used to implement security control on a security area, and in particular, the security alarm method based on the dispelling device may be applied to the dispelling device, or may be applied to a local server or a cloud server that processes security control transactions of the security area, such as a control host or a monitoring device shown in fig. 3, where embodiments of the present invention are not limited. As shown in fig. 1, the security alarm method based on the dispelling device may include the following operations:
101. and acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area.
In the embodiment of the invention, optionally, the security area may include one or more of a land security area, a water area security area, and an airspace security area, the land security area may include any indoor area and/or outdoor area with security requirements, such as a square, an inside and an outside of a key building, and the like, the water area security area may include a water surface security area and/or an underwater security area, such as a bridge perimeter security area, a wind farm perimeter security area, a submarine farm security area, and the like, and the embodiment of the invention is not limited.
In the embodiment of the present invention, optionally, the monitoring device may include any one or more of a video monitoring device, an image monitoring device, an infrared monitoring device, a radar monitoring device, a thermal sensing monitoring device, a sound sensor, and the like, and the embodiment of the present invention is not limited. Optionally, when multiple monitoring devices are included, the multiple monitoring devices may be integrated in the same apparatus, or may be integrated in different apparatuses, and embodiments of the present invention are not limited.
In the embodiment of the present invention, optionally, the real-time monitoring data of the security area may include one or more of video monitoring data, image monitoring data, infrared monitoring data, radar monitoring data, thermal sensing monitoring data, sound monitoring data, and the like, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, the placement area can comprise at least one security sub-area, each security sub-area has a corresponding security level, and the security level corresponding to the security sub-area has an association relationship with the monitoring equipment of the security sub-area and/or the acquisition frequency of real-time monitoring data. Optionally, the higher the corresponding security level is, the higher the collection frequency of the real-time monitoring data of the security sub-area is, and/or the higher the corresponding security level is, the more the number and/or variety of the monitoring devices of the security sub-area is, and/or the higher the corresponding security level is, the better the monitoring effect of the monitoring devices of the security sub-area is.
102. And judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area, and triggering and executing step 103 when the judgment result of step 102 is yes.
As an optional implementation manner, according to real-time monitoring data of a security area, judging whether an abnormal target of abnormal intrusion exists in the security area includes:
according to the data type of the real-time monitoring data of the security area, determining a target recognition model matched with the real-time monitoring data from a preset abnormal recognition model set, wherein the abnormal recognition model set can comprise one or more of a video abnormal recognition model, an image abnormal recognition model, an infrared abnormal recognition model, a radar abnormal recognition model, a thermal perception abnormal recognition model, a sound abnormal recognition model and a three-dimensional information abnormal recognition model, and further comprises one or more of an abnormal biological recognition algorithm, an abnormal equipment recognition algorithm, an abnormal environment recognition algorithm and the like, and the abnormal biological recognition algorithm can comprise an abnormal personnel recognition algorithm and/or an abnormal animal recognition algorithm;
inputting the real-time monitoring data into the target recognition model so that the target recognition model analyzes the real-time monitoring data to obtain an abnormal target recognition result of the real-time monitoring data, wherein the abnormal target recognition result is used for representing whether an abnormal target of abnormal invasion exists in the security area.
In this optional embodiment, if the target recognition model includes a three-dimensional information anomaly recognition model, before inputting the real-time monitoring data into the three-dimensional information anomaly recognition model to enable the three-dimensional information anomaly recognition model to analyze the real-time monitoring data to obtain an anomaly target recognition result of the real-time monitoring data, the method may further include: according to the real-time monitoring data, constructing three-dimensional model information of the security area as new real-time monitoring data, and triggering and executing the operation of inputting the real-time monitoring data into the three-dimensional information anomaly identification model so as to enable the three-dimensional information anomaly identification model to analyze the real-time monitoring data and obtain an anomaly target identification result of the real-time monitoring data.
It can be seen that implementing this alternative embodiment can improve the accuracy, variety and flexibility of outlier target recognition.
In the embodiment of the invention, optionally, the abnormal target may include an abnormal organism (such as an abnormal person or an abnormal animal) of the abnormal invasion and/or an abnormal device of the abnormal invasion (such as an abnormal invading vehicle, an unmanned aerial vehicle, etc.).
103. And controlling target dispelling equipment of the security area to perform alarm processing and/or dispelling processing.
The alarm processing can be used for reminding the security area of the existence of the abnormal target, and the dispelling processing can be used for driving the abnormal target to leave the security area.
In the embodiment of the invention, the target dispelling equipment is optionally provided with an alarm structure for alarm processing, and the alarm structure can comprise one or more of an audio alarm structure, a display alarm structure, a light alarm structure and a communication alarm structure.
In the embodiment of the invention, optionally, the target dispelling device may include a contact dispelling device and/or a non-contact dispelling device, where the contact dispelling device is used to indicate that physical contact is required with the abnormal target when the abnormal target is dispelling, and the non-contact dispelling device is used to indicate that physical contact is not required with the abnormal target when the abnormal target is dispelling. Preferably, a non-contact type dispersing device is adopted as the target dispersing device, alternatively, the non-contact type dispersing device may comprise a non-contact type dispersing device based on fluctuation, and the non-contact type dispersing device based on fluctuation may comprise one or more of a sound wave dispersing device, a light wave dispersing device and an electromagnetic wave dispersing device. Alternatively, the target dissipating device may comprise a mobile dissipating device and/or a non-mobile dissipating device.
In the embodiment of the present invention, optionally, when multiple target dispersing apparatuses are included, the multiple target dispersing apparatuses may be integrated in the same device, for example, the sound wave dispersing apparatus and the light wave dispersing apparatus may be integrated in the same device to form the sound-light drive dispersing apparatus, or may be integrated in different devices.
In the embodiment of the present invention, optionally, the target dispelling device and the monitoring device may be integrated in the same apparatus, for example, the sound wave dispelling device and the monitoring device may be integrated in the same apparatus to form a sound protection monitoring integrated device, or may be integrated in different apparatuses, and the embodiment of the present invention is not limited.
In the embodiment of the invention, the association relation between the security level corresponding to the security sub-area and the dispelling equipment of the security sub-area is optional. Optionally, the higher the corresponding security level, the more the number and/or variety of the dispelling devices of the security sub-area, and/or the higher the corresponding security level, the better the dispelling effect of the dispelling devices of the security sub-area.
Therefore, when the monitoring equipment monitors the abnormal targets with abnormal invasion, the embodiment of the invention can control the corresponding dispelling equipment to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security is too dependent on subjective activity of monitoring personnel are reduced, the reliability of security is improved, and the life safety and property safety of people are ensured.
In an alternative embodiment, before the target dispelling device controlling the security area performs the alarm processing and/or the dispelling processing, the method may further include:
judging whether the abnormal target meets preset processing conditions according to the intrusion time information of the abnormal target, wherein the preset processing conditions can comprise preset alarm conditions and/or preset dispelling conditions;
when the abnormal target is judged to meet the preset processing condition, the target dispelling equipment for controlling the security area is triggered to perform alarm processing and/or dispelling processing.
In this optional embodiment, as an optional implementation manner, determining whether the abnormal target meets the preset processing condition according to the intrusion time information of the abnormal target may include:
judging whether the intrusion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
In this alternative embodiment, when the abnormal target satisfies the preset alarm condition, the target dispelling device is controlled to perform alarm processing, and when the abnormal target satisfies the preset dispelling condition, the target dispelling device is controlled to perform dispelling processing.
In this optional embodiment, optionally, the respective dispersing trigger periods corresponding to the preset alarm condition and the preset dispersing condition may be the same or different, and the respective intrusion duration thresholds corresponding to the preset alarm condition and the preset dispersing condition may be the same or different.
Therefore, by implementing the optional embodiment, whether the abnormal target needs to be alarmed or not can be judged according to the invasion time or invasion duration of the abnormal target, so that unnecessary alarm processing and dispersing processing are reduced, and the waste of security resources is reduced.
In another alternative embodiment, before the target dispelling device controlling the security area performs the alarm processing and/or the dispelling processing, the method may further include:
according to the target type of the abnormal target and/or the abnormal target identification result, determining target dispelling equipment matched with the abnormal target from one or more dispelling equipment of the security area, and triggering the target dispelling equipment for controlling the security area to perform alarm processing and/or dispelling processing;
Optionally, the target type to which the abnormal target belongs is any one of personnel, animals and equipment, optionally, if the target type to which the abnormal target belongs is personnel or animals, the target dispelling equipment matched with the abnormal target may include an acoustic wave dispelling equipment and/or an optical wave dispelling equipment, and if the target type to which the abnormal target belongs is equipment, the target dispelling equipment matched with the abnormal target may include an electromagnetic wave dispelling equipment, optionally, the electromagnetic wave dispelling equipment may include equipment for electromagnetic interference on the abnormal target.
It can be seen that implementing this alternative embodiment can select a dispelling device matching with the abnormal target according to the target type of the abnormal target, so as to facilitate effective dispelling of the abnormal target and reduce waste of dispelling device resources.
Example two
Referring to fig. 2, fig. 2 is a flow chart of another security alarm method based on dispelling equipment according to an embodiment of the present invention. The security alarm method based on the dispelling device described in fig. 2 may be used to implement security control on a security area, and in particular, the security alarm method based on the dispelling device may be applied to the dispelling device, or may be applied to a local server or a cloud server that processes security control transactions of the security area, such as a control host or a monitoring device shown in fig. 3, where embodiments of the present invention are not limited. As shown in fig. 2, the security alarm method based on the dispelling device may include the following operations:
201. And acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area.
202. And judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area, and triggering and executing step 203 when the judgment result of step 202 is yes.
203. Based on the real-time monitoring data, analyzing the real-time invasion condition of the abnormal target to obtain a first analysis result.
In the embodiment of the present invention, optionally, the first analysis result may include one or more of first location information of the abnormal target, first quantity information of the abnormal target, and first attribute information of the abnormal target. Further optionally, the first location information of the abnormal target may include one or more of a first real-time location of the abnormal target, historical movement track information of the abnormal target, and predicted movement track information of the abnormal target, and the first real-time location may include current location coordinates of the abnormal target and/or a security sub-area where the abnormal target is located. Further optionally, if the abnormal target is an abnormal person, the first attribute information of the abnormal target may include one or more of a predicted age, a predicted gender, dangerous object carrying information, predicted status information, equipment configuration information, and the like of the abnormal target; if the abnormal target is an abnormal animal, the first attribute information of the abnormal target may include an animal type, a predicted age, a predicted gender, and predicted status information to which the abnormal target belongs; if the abnormal object is an abnormal device, the first attribute information of the abnormal object may include a device type, a device size, and predicted status information, where the predicted status information is used to represent a predicted mobility status of the abnormal object, such as a moving speed, a moving flexibility, and the like of the abnormal object.
As an optional implementation manner, based on the real-time monitoring data, the analyzing the real-time intrusion condition of the abnormal target to obtain the first analysis result may include:
determining a target intrusion analysis model matched with an abnormal target from a preset intrusion analysis model set according to the data type of the real-time monitoring data, wherein the intrusion analysis model set can comprise one or more of a video intrusion analysis model, an image intrusion analysis model, an infrared intrusion analysis model, a radar intrusion analysis model, a thermal perception intrusion analysis model, a sound intrusion analysis model and a three-dimensional information intrusion analysis model, and further comprises a biological intrusion condition analysis algorithm and/or a device intrusion condition analysis algorithm, and the biological intrusion condition analysis algorithm can comprise a personnel intrusion condition analysis algorithm and/or an animal intrusion condition analysis algorithm;
inputting the data to be analyzed into the target intrusion analysis model so as to enable the target intrusion analysis model to analyze the data to be analyzed to obtain a first analysis result, wherein the data to be analyzed comprises real-time monitoring data, and further comprises the target type of the abnormal target and/or the abnormal target identification result in the embodiment.
Therefore, the implementation of the alternative implementation mode can analyze the real-time invasion condition of the abnormal target based on the model, and the accuracy and the reliability of the real-time invasion condition analysis are improved.
204. And determining the emergency attribute matched with the abnormal target according to the first analysis result.
As an alternative embodiment, determining, according to the first analysis result, an emergency attribute that matches the abnormal target may include;
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining the emergency attribute matched with the abnormal target according to the hazard degree parameter.
Optionally, the emergency attribute may include an alarm attribute and/or a dispersion attribute, where the dispersion attribute may include one or more of a dispersion manner matched with the abnormal target, a dispersion intensity matched with the abnormal target, and dispersion space information matched with the abnormal target, the dispersion space information may include one or more of a dispersion direction matched with the abnormal target, a dispersion track matched with the abnormal target, and a dispersion range matched with the abnormal target, and the alarm attribute may include one or more of an alarm manner matched with the abnormal target, an alarm content matched with the abnormal target, an alarm object matched with the abnormal target, and the like.
Optionally, the dispelling mode may include one or more of a warning mode, a powerful dispelling mode, and a powerful attacking mode, and the alarming mode may include one or more of an audible alarming mode, a display alarming mode, a light wave alarming mode, and a communication alarming mode.
Therefore, the implementation of the alternative implementation mode determines the corresponding emergency attribute by analyzing the hazard degree parameter of the abnormal target, further determines the corresponding alarm control parameter and the corresponding dispersion control parameter, can improve the matching degree of the alarm control parameter and the dispersion control parameter and the hazard degree of the abnormal target, is beneficial to improving the success rate and the accuracy of alarm and dispersion, can reduce the excessive dispersion of the abnormal target, further reduces unnecessary damage to the abnormal target and excessive waste of dispersion resources, and reduces damage to life safety and property safety of people due to overlarge dispersion intensity.
In this optional embodiment, optionally, determining, according to the first analysis result, a hazard degree parameter of the abnormal target may include:
determining a hazard degree sub-parameter corresponding to each sub-analysis result in the first analysis result according to a hazard degree calculation sub-algorithm corresponding to each sub-analysis result in the first analysis result and/or a hazard degree association relation corresponding to each sub-analysis result;
And calculating the hazard degree parameters of the abnormal target according to the hazard degree weight corresponding to each sub-analysis result in the first analysis result and the hazard degree sub-parameter corresponding to each sub-analysis result in the first analysis result.
It can be seen that implementing this alternative embodiment can improve the accuracy and reliability of hazard level parameter analysis of anomalous targets.
205. And generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute.
As an optional implementation manner, when the target dispelling device of the security area includes a non-contact dispelling device based on fluctuation, generating, according to the emergency attribute, a dispelling control parameter matched with the target dispelling device of the security area may include:
determining a target working mode matched with a dispersing mode from at least one fluctuation working mode of the target dispersing equipment as a dispersing control parameter of the target dispersing equipment; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
And determining the wave propagation direction matched with the target dispersing device according to the dispersing space information as a dispersing control parameter of the target driving device.
In this alternative embodiment, alternatively, the wave operation mode may include one or more of a warning mode for prompting the abnormal target to leave the security area actively by outputting warning information, a wave dispersion mode for outputting strong waves to make the abnormal target uncomfortable and forced to leave the security area, and a wave attack mode for outputting strong waves to make the abnormal target uncomfortable and lose mobility, for example, the wave operation mode of the acoustic wave dispersion device may include one or more of a voice warning mode, a strong sound dispersion mode, and a strong sound attack mode, the wave operation mode of the optical wave dispersion device may include one or more of a light warning mode, a strong light dispersion mode, and a strong light attack mode, and the wave operation mode of the electromagnetic wave dispersion device may include one or more of a communication warning mode, an electromagnetic wave interference mode, and an electromagnetic wave attack mode.
In this alternative embodiment, the fluctuation bundling level may be used to control the fluctuation output range and output intensity of the target dispersing apparatus.
Therefore, by implementing the optional implementation mode, the working mode, the fluctuation attribute parameters and the dispersing space information of the fluctuation-based non-contact dispersing equipment can be determined according to the emergency attribute, the accuracy and the reliability of determining the dispersing control parameters are further improved, and the accuracy and the reliability of dispersing abnormal targets are further improved.
206. Based on the alarm control parameters, the control target dispelling equipment carries out alarm processing on related personnel in the security area so as to remind the security area of abnormal targets; and/or based on the dispelling control parameter, controlling the target dispelling device to perform dispelling processing on the abnormal target so as to drive the abnormal target to leave the security area.
In the embodiment of the present invention, for other descriptions of step 201, step 202 and step 206, please refer to the detailed descriptions of step 101-step 103 in the first embodiment, and the description of the embodiment of the present invention is omitted.
Therefore, when the monitoring equipment monitors that the abnormal target with abnormal invasion exists, the embodiment of the invention can control the corresponding dispelling equipment to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security and protection are too dependent on subjective activity of monitoring personnel are reduced, the security and protection reliability is improved, the life safety and property safety of people are guaranteed, in addition, the real-time invasion condition of the abnormal target is analyzed in real time, and then matched dispelling control parameters and alarming control parameters are determined, so that the dispelling equipment is adaptively controlled according to the real-time invasion condition of the abnormal target, the flexibility and accuracy of alarming and dispelling are improved, and the success rate of dispelling the abnormal target is improved.
In an alternative embodiment, the method may further comprise:
judging whether a target to be protected exists in the peripheral range of the abnormal target or not based on the real-time monitoring data;
when the object to be protected exists in the peripheral range, analyzing the real-time situation of the object to be protected based on the real-time monitoring data to obtain a second analysis result;
and updating the emergency attribute according to the second analysis result, and triggering and executing the operation of generating the alarm control parameters and/or the dispersion control parameters matched with the target dispersion equipment of the security area according to the emergency attribute.
Optionally, the method of determining whether the target to be protected exists in the peripheral range by using the real-time monitoring data may refer to the method of determining whether the abnormal target exists in the security area by using the real-time monitoring data in the first embodiment, and/or the method of obtaining the second analysis result based on the real-time monitoring data may refer to the method of obtaining the first analysis result based on the real-time monitoring data in the first embodiment.
Alternatively, the object to be protected may comprise an organism to be protected and/or a device to be protected, and the organism to be protected may comprise a person to be protected and/or an animal to be protected.
Optionally, the peripheral range of the abnormal target may be one or more of a circular area with the abnormal target as a circle center and a preset length as a radius, a security sub-area where the abnormal target is currently located, and a security sub-area matched with the predicted movement track information of the abnormal target, and a security sub-area matched with the dispersed space information.
Therefore, when the target to be protected exists in the peripheral range of the abnormal target, the emergency attribute can be adjusted according to the real-time situation of the target to be protected, so that damage to the target to be protected in the process of dispelling the abnormal target can be reduced.
In this optional embodiment, as an optional implementation manner, the second analysis result may include one or more of second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
and updating the attribute of the emergency according to the second analysis result, which can comprise:
according to the second analysis result, determining a risk degree parameter of the target to be protected, wherein the risk degree parameter is used for representing the severity degree of threat generated by the abnormal target to be protected and/or the severity degree of threat generated by the target to be protected when the target dispelling equipment of the security area dissipates the abnormal target;
And updating the attribute of the emergency according to the risk degree parameter.
Alternatively, the method for determining the risk level parameter of the object to be protected according to the second analysis result may refer to a method for determining the risk level parameter of the abnormal object according to the first analysis result.
It can be seen that the implementation of the alternative implementation can adjust the emergency attribute according to the risk degree parameter to be protected, so as to be beneficial to reducing the security threat generated by the abnormal target to be protected and the security threat generated by the abnormal target to be protected due to dispelling the abnormal target.
In order to better understand the first embodiment and the second embodiment of the present invention, the security control flow of the first embodiment and the second embodiment of the present invention is illustrated below based on fig. 3:
as shown in fig. 3, the security area is configured with a dispelling device, a monitoring device and a control host, the monitoring device can collect real-time monitoring data of the security area (such as the sound protection control area shown in fig. 3), the monitoring device can judge whether an abnormal target exists in the security area according to the real-time monitoring data, can send the real-time monitoring data to the control host so as to judge whether the abnormal target exists in the security area by the control host, and can send the real-time monitoring data to a monitoring data checking terminal of a monitoring person so as to judge whether the abnormal target exists in the security area by the monitoring person. When the monitoring equipment or the control host judges that an abnormal target exists in the security area, an alarm control instruction and a dispersion control instruction are sent to the dispersion equipment, and in addition, a monitoring person can send the dispersion control instruction to the dispersion equipment through the monitoring data checking terminal or send the dispersion control instruction to the control host so that the control host can send the dispersion control instruction to the dispersion equipment. When the dispelling control instruction is received, the dispelling equipment can execute corresponding dispelling processing on the abnormal target, so that security control of the security area is realized, and when the alarm control instruction is received, the dispelling equipment can carry out alarm processing on related personnel in the security area. In addition, the security protection area may include a plurality of security protection subareas, security protection grades corresponding to different security protection subareas are different, and as shown in fig. 3, the security protection grade corresponding to the second security protection subarea is higher than the security protection grade corresponding to the first security protection subarea, when an abnormal target invades different security protection subareas, different dispelling devices or dispelling modes are adopted, for example, when the abnormal target invades the first security protection subarea, only the sound wave dispelling device is required to be started, when the abnormal target invades the second security protection subarea, only the light wave dispelling device is required to be started, or when the abnormal target invades the first security protection subarea, only voice warning is required to be carried out, and when the abnormal target invades the second security protection subarea, strong sound dispelling or strong sound attack is required to be carried out on the abnormal target.
Example III
Referring to fig. 4, fig. 4 is a schematic structural diagram of another security alarm device based on dispelling equipment according to an embodiment of the present invention. The security alarm device based on the dispelling device described in fig. 4 may be used to implement security control on a security area, and in particular, the security alarm device based on the dispelling device may be integrated in the dispelling device, or may be integrated in a local server or a cloud server that processes security control transactions of the security area, such as a control host or a monitoring device shown in fig. 3, where embodiments of the present invention are not limited. As shown in fig. 4, the security alarm device based on the dispelling device may include:
the acquiring module 301 is configured to acquire real-time monitoring data of a security area acquired by a monitoring device corresponding to the security area;
the judging module 302 is configured to judge whether an abnormal target of abnormal intrusion exists in the security area according to the real-time monitoring data of the security area;
and the control module 303 is configured to control the target dispelling device in the security area to perform alarm processing and/or dispelling processing when the judging module 302 judges that the security area has an abnormal target, where the alarm processing may be used to remind the security area of the abnormal target, and the dispelling processing may be used to drive the abnormal target to leave the security area.
Therefore, when the monitoring device monitors the abnormal targets with abnormal invasion, the device described in the implementation figure 4 can control the corresponding dispelling device to alarm and dispel, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to process due to the fact that security is too dependent on subjective activity of monitoring personnel are reduced, the reliability of security is improved, and the life safety and property safety of people are guaranteed.
In an alternative embodiment, as shown in fig. 5, the apparatus may further include:
the analysis module 304 is configured to analyze a real-time intrusion condition of an abnormal target based on real-time monitoring data before the control module 303 controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing, so as to obtain a first analysis result;
a determining module 305, configured to determine, according to the first analysis result, an emergency attribute that matches the abnormal target;
the generating module 306 is configured to generate, according to the emergency attribute, an alarm control parameter and/or a dispersion control parameter that are matched with the target dispersing device in the security area;
the specific manner in which the control module 303 controls the target dispelling device of the security area to perform the alarm processing and/or the dispelling processing may include:
Based on the alarm control parameters, the control target dispelling equipment carries out alarm processing on related personnel in the security area so as to remind the security area of abnormal targets; and/or the number of the groups of groups,
based on the dispelling control parameters, the control target dispelling device carries out dispelling processing on the abnormal target so as to drive the abnormal target to leave the security area.
Therefore, the device described in the implementation fig. 5 analyzes the real-time intrusion condition of the abnormal target in real time, and further determines the matched dispelling control parameter and alarm control parameter, so that the dispelling equipment is adaptively controlled according to the real-time intrusion condition of the abnormal target, the flexibility and accuracy of alarm and dispelling are improved, and the success rate of dispelling the abnormal target is improved.
In another alternative embodiment, as shown in fig. 5, the analysis result may include first location information of the abnormal target and/or first attribute information of the abnormal target;
the determining module 305 determines, according to the first analysis result, a specific manner of the emergency attribute matching the abnormal target, which may include:
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
Determining an emergency attribute matched with the abnormal target according to the hazard degree parameter, wherein the emergency attribute can comprise an alarm attribute and/or a dispersing attribute, the dispersing attribute can comprise one or more of dispersing modes matched with the abnormal target, dispersing intensity matched with the abnormal target and dispersing space information matched with the abnormal target, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal target, dispersing tracks matched with the abnormal target and dispersing ranges matched with the abnormal target.
It can be seen that implementing the apparatus described in fig. 5 determines the corresponding emergency attribute by analyzing the hazard degree parameter of the abnormal target, thereby determining the corresponding alarm control parameter and the dispersion control parameter, and improving the matching degree of the alarm control parameter and the dispersion control parameter with the hazard degree of the abnormal target, which is not only beneficial to improving the success rate and the accuracy of the alarm and the dispersion, but also reducing the excessive dispersion of the abnormal target, thereby reducing unnecessary damage to the abnormal target and excessive waste of the dispersion resource, and reducing the damage to the life safety and the property safety of people due to the excessive dispersion strength.
In yet another alternative embodiment, as shown in fig. 5, when the target dissipating device of the security area includes a non-contact dissipating device based on fluctuation, the specific manner of generating, by the generating module 306, the dissipating control parameter that matches the target dissipating device of the security area according to the emergency attribute may include:
determining a target working mode matched with a dispersing mode from at least one fluctuation working mode of the target dispersing equipment as a dispersing control parameter of the target dispersing equipment; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
Therefore, the device described in the implementation fig. 5 can determine the working mode, the fluctuation attribute parameter and the dispersing space information of the fluctuation-based non-contact dispersing equipment according to the emergency attribute, so that the accuracy and the reliability of determining the dispersing control parameter are further improved, and the accuracy and the reliability of dispersing the abnormal target are further improved.
In yet another alternative embodiment, as shown in fig. 5, the determining module 302 is further configured to determine, based on the real-time monitoring data, whether the target to be protected exists in the peripheral range of the abnormal target;
the analysis module 304 is further configured to, when the judging module 302 judges that the target to be protected exists in the peripheral range, analyze a real-time situation of the target to be protected based on the real-time monitoring data, and obtain a second analysis result;
the apparatus may further include:
and the updating module 307 is configured to update the emergency attribute according to the second analysis result, and trigger and execute the above operation of generating the alarm control parameter and/or the dissipation control parameter matched with the target dissipation device of the security area according to the emergency attribute.
It can be seen that the device described in fig. 5 can also adjust the emergency attribute according to the real-time situation of the target to be protected when the target to be protected exists in the peripheral range of the abnormal target, so as to be beneficial to reducing the damage to the target to be protected in the process of dispelling the abnormal target.
In yet another alternative embodiment, as shown in fig. 5, the second analysis result may include one or more of second location information of the object to be protected, second number information of the object to be protected, and second attribute information of the object to be protected;
And, the specific way of updating the attribute of the response by the updating module 307 according to the second analysis result may include:
according to the second analysis result, determining a risk degree parameter of the target to be protected, wherein the risk degree parameter can be used for representing the severity degree of threat generated by the abnormal target to be protected and/or the severity degree of threat generated by the target to be protected when the target dispelling equipment of the security area dissipates the abnormal target;
and updating the attribute of the emergency according to the risk degree parameter.
It can be seen that the implementation of the apparatus described in fig. 5 is also capable of adjusting the emergency attribute according to the risk level parameter to be protected, so as to facilitate reducing the security threat generated by the abnormal target to be protected and the security threat generated by the abnormal target to be protected due to dispelling the abnormal target.
In yet another alternative embodiment, as shown in fig. 5, the determining module 302 is further configured to determine, before the control module 303 controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing, whether the abnormal target meets a preset processing condition according to intrusion time information of the abnormal target; when it is determined that the abnormal target meets the preset processing condition, the control module 303 is triggered to execute the operation of controlling the target dispelling device of the security area to perform alarm processing and/or dispelling processing, where the preset processing condition may include a preset alarm condition and/or a preset dispelling condition;
Optionally, the determining module 302 determines, according to intrusion time information of the abnormal target, whether the abnormal target meets a specific manner of the preset processing condition, may include:
judging whether the intrusion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
It can be seen that the device described in fig. 5 can also determine whether to disperse the abnormal target according to the intrusion time or intrusion duration of the abnormal target, so as to reduce unnecessary alarm processing and dispersing processing and reduce the waste of security resources.
Example IV
The embodiment of the invention discloses a security control device, which can comprise a dispelling device, a monitoring device and a control host, as shown in fig. 3, wherein the control host or the monitoring device can be used for executing the steps in the security alarm method based on the dispelling device described in the first embodiment or the second embodiment of the invention.
Example five
Referring to fig. 6, fig. 6 is a schematic structural diagram of a security alarm device based on a dispelling device according to an embodiment of the present invention. As shown in fig. 6, the security alarm device based on the dispelling device may include:
a memory 401 storing executable program codes;
a processor 402 coupled with the memory 401;
the processor 402 invokes executable program codes stored in the memory 401 to execute the steps in the security alarm method based on the dispelling device described in the first embodiment or the second embodiment of the present invention.
Example six
The embodiment of the invention discloses a computer storage medium which stores computer instructions for executing the steps in the security alarm method based on dispelling equipment described in the first embodiment or the second embodiment of the invention when the computer instructions are called.
Example seven
An embodiment of the present invention discloses a computer program product, which includes a non-transitory computer readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform the steps in the security alarm method based on a dispelling device described in the first embodiment or the second embodiment.
The apparatus embodiments described above are merely illustrative, wherein the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above detailed description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product that may be stored in a computer-readable storage medium including Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) or other optical disc Memory, magnetic disc Memory, tape Memory, or any other medium that can be used for computer-readable carrying or storing data.
Finally, it should be noted that: the embodiment of the invention discloses a security alarm device and a security alarm method based on dispelling equipment, which are disclosed by the embodiment of the invention only for illustrating the technical scheme of the invention, but not limiting the technical scheme; although the invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that; the technical scheme recorded in the various embodiments can be modified or part of technical features in the technical scheme can be replaced equivalently; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (10)

1. A security alarm device based on dispelling equipment, the device comprising:
the acquisition module is used for acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area;
the judging module is used for judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
the control module is used for controlling target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing when the judging module judges that the abnormal target exists in the security area, wherein the alarm processing is used for reminding that the abnormal target exists in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area.
2. The security alarm device based on dispelling equipment of claim 1, further comprising:
the analysis module is used for analyzing the real-time invasion condition of the abnormal target based on the real-time monitoring data before the control module controls the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing, so as to obtain a first analysis result;
the determining module is used for determining emergency attributes matched with the abnormal targets according to the first analysis result;
the generation module is used for generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute;
the specific mode of the control module for controlling the target dispelling equipment in the security area to carry out alarm processing and/or dispelling processing comprises the following steps:
based on the alarm control parameters, controlling the target dispelling equipment to alarm related personnel in the security area so as to remind the security area of the abnormal target; and/or the number of the groups of groups,
and controlling the target dispelling equipment to carry out dispelling processing on the abnormal target based on the dispelling control parameter so as to drive the abnormal target to leave the security area.
3. The dispelling device-based security alarm apparatus of claim 2, wherein the first analysis result includes one or more of first location information of the abnormal target, first quantity information of the abnormal target, and first attribute information of the abnormal target;
the determining module determines a specific mode of the emergency attribute matched with the abnormal target according to the first analysis result, and the specific mode comprises the following steps:
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining emergency attributes matched with the abnormal targets according to the hazard degree parameters, wherein the emergency attributes comprise alarm attributes and/or dispersing attributes, the dispersing attributes comprise one or more of dispersing modes matched with the abnormal targets, dispersing intensities matched with the abnormal targets and dispersing space information matched with the abnormal targets, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal targets, dispersing tracks matched with the abnormal targets and dispersing ranges matched with the abnormal targets.
4. The security alarm device based on the dispelling device according to claim 3, wherein when the target dispelling device of the security area includes a non-contact dispelling device based on fluctuation, the generating module generates, according to the emergency attribute, a specific manner of dispelling control parameters matched with the target dispelling device of the security area, including:
determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device as a dispersing control parameter of the target dispersing device; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
5. The security alarm device based on a dispelling apparatus according to any one of claims 2-4, wherein the judging module is further configured to judge whether a target to be protected exists in a peripheral range of the abnormal target based on the real-time monitoring data;
the analysis module is further configured to, when the judgment module judges that the target to be protected exists in the peripheral range, analyze a real-time situation of the target to be protected based on the real-time monitoring data, and obtain a second analysis result;
the apparatus further comprises:
and the updating module is used for updating the emergency attribute according to the second analysis result and triggering and executing the operation of generating the alarm control parameter and/or the dispersion control parameter matched with the target dispersion equipment of the security area according to the emergency attribute.
6. The dispelling device-based security alarm apparatus of claim 5, wherein the second analysis result includes one or more of second location information of the object to be protected, second number information of the object to be protected, and second attribute information of the object to be protected;
And the specific mode of updating the emergency attribute by the updating module according to the second analysis result comprises the following steps:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected caused by the abnormal target and/or the severity degree of threat to the target to be protected caused by target dispelling equipment in the security area when dispelling the abnormal target;
and updating the emergency attribute according to the risk degree parameter.
7. The security alarm device based on a dissipating device according to any one of claims 1, 2, 3, 4, and 6, wherein the judging module is further configured to judge, according to intrusion time information of the abnormal target, whether the abnormal target meets a preset processing condition before the control module controls the target dissipating device of the security area to perform alarm processing and/or dissipating processing; when the abnormal target meets the preset processing condition, triggering the control module to execute the operation of controlling the target dispelling equipment of the security area to perform alarm processing and/or dispelling processing, wherein the preset processing condition comprises a preset alarm condition and/or a preset dispelling condition;
The judging module judges whether the abnormal target meets a specific mode of a preset processing condition according to the invasion time information of the abnormal target, and comprises the following steps:
judging whether the invasion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the invasion time information comprises the invasion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
8. A security alarm method based on dispelling equipment, the method comprising:
acquiring real-time monitoring data of a security area, which are acquired by monitoring equipment corresponding to the security area;
judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
and when the judgment result is yes, controlling the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing, wherein the alarm processing is used for reminding the existence of the abnormal target in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area.
9. A security alarm device based on dispelling equipment, the device comprising:
a memory storing executable program code;
a processor coupled to the memory;
the processor invokes the executable program code stored in the memory to perform the security alarm method based on the dispelling device of claim 8.
10. A computer storage medium storing computer instructions which, when invoked, are operable to perform the dispelling device based security alarm method of claim 8.
CN202310711609.9A 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment Active CN116453284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310711609.9A CN116453284B (en) 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310711609.9A CN116453284B (en) 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment

Publications (2)

Publication Number Publication Date
CN116453284A true CN116453284A (en) 2023-07-18
CN116453284B CN116453284B (en) 2023-09-26

Family

ID=87124093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310711609.9A Active CN116453284B (en) 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment

Country Status (1)

Country Link
CN (1) CN116453284B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117407573A (en) * 2023-11-13 2024-01-16 广州智业节能科技有限公司 Visual security data processing method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424371B1 (en) * 1997-09-24 2002-07-23 Sheree H. Wen Intelligent video monitor system
CN202373096U (en) * 2011-12-12 2012-08-08 杭州市电力局 Invasion alarm system for electrical facilities
CN206212165U (en) * 2015-11-02 2017-05-31 克拉玛依市格恩赛电子科技有限公司 A kind of over-the-horizon radar wide area joint defense system
CN109493553A (en) * 2018-11-08 2019-03-19 华南理工大学 A kind of strong sound system of intelligent positioning based on image recognition
CN111272021A (en) * 2019-08-28 2020-06-12 建投物联(江西)股份有限公司 Intelligent reversible sound wave expelling system
CN210895724U (en) * 2020-01-21 2020-06-30 西安科技大学 Voice warning system based on wireless cluster technology
CN112150747A (en) * 2020-09-04 2020-12-29 广州市声讯电子科技股份有限公司 Novel protection early warning system
CN114973573A (en) * 2022-06-14 2022-08-30 浙江大华技术股份有限公司 Target intrusion determination method and device, storage medium and electronic device
CN115100808A (en) * 2022-06-29 2022-09-23 广州市声讯电子科技股份有限公司 Acousto-optic intelligent dispersing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424371B1 (en) * 1997-09-24 2002-07-23 Sheree H. Wen Intelligent video monitor system
CN202373096U (en) * 2011-12-12 2012-08-08 杭州市电力局 Invasion alarm system for electrical facilities
CN206212165U (en) * 2015-11-02 2017-05-31 克拉玛依市格恩赛电子科技有限公司 A kind of over-the-horizon radar wide area joint defense system
CN109493553A (en) * 2018-11-08 2019-03-19 华南理工大学 A kind of strong sound system of intelligent positioning based on image recognition
CN111272021A (en) * 2019-08-28 2020-06-12 建投物联(江西)股份有限公司 Intelligent reversible sound wave expelling system
CN210895724U (en) * 2020-01-21 2020-06-30 西安科技大学 Voice warning system based on wireless cluster technology
CN112150747A (en) * 2020-09-04 2020-12-29 广州市声讯电子科技股份有限公司 Novel protection early warning system
CN114973573A (en) * 2022-06-14 2022-08-30 浙江大华技术股份有限公司 Target intrusion determination method and device, storage medium and electronic device
CN115100808A (en) * 2022-06-29 2022-09-23 广州市声讯电子科技股份有限公司 Acousto-optic intelligent dispersing system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117407573A (en) * 2023-11-13 2024-01-16 广州智业节能科技有限公司 Visual security data processing method and system
CN117407573B (en) * 2023-11-13 2024-04-12 广州智业节能科技有限公司 Visual security data processing method and system

Also Published As

Publication number Publication date
CN116453284B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
CN107911653B (en) Intelligent video monitoring module, system, method and storage medium for residence
CN116453284B (en) Security alarm device and method based on dispelling equipment
CN110675586A (en) Airport enclosure intrusion monitoring method based on video analysis and deep learning
CN107645652A (en) A kind of illegal geofence system based on video monitoring
CN107818312A (en) A kind of embedded system based on abnormal behaviour identification
CN109618287B (en) Prisoner management method and device based on UWB positioning
CN112737121A (en) Intelligent video monitoring, analyzing, controlling and managing system for power grid
CN109614906A (en) A kind of security system and security alarm method based on deep learning
CN102708643A (en) Invasion detection method and system
CN111564224A (en) Intelligent monitoring system with health monitoring function and implementation method thereof
CN112530115A (en) Electric power operation personnel protection against electric shock scene intelligence supervises integrated equipment
CN110634506A (en) Voice data processing method and device
US10614688B1 (en) Detecting and identifying activities and events within a property's security perimeter using a configurable network of vibration and motion sensors
CN110718041A (en) Method, device and system for preventing children from getting lost and storage medium
CN111165466A (en) Method, device and system for repelling insects
CN108399698A (en) Boundary's intrusion preventing alarm system is enclosed on a kind of airport
CN116778657A (en) Method and system for intelligently identifying intrusion behavior
CN111696292A (en) Artificial intelligence early warning system
CN116704411A (en) Security control method, system and storage medium based on Internet of things
CN212933554U (en) Workshop management and control system
CN115100572A (en) System and method for analyzing abnormal behaviors of campus
CN116740874A (en) Intrusion detection method and related device
CN117456471B (en) Perimeter security method, perimeter security system, terminal equipment and storage medium
CN113111332A (en) Artificial intelligence real-time detection security attack system
CN216562028U (en) New energy station safety intelligent prevention and control monitoring system based on internet of things technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant