CN116978176A - Intelligent community safety monitoring method and related device - Google Patents

Intelligent community safety monitoring method and related device Download PDF

Info

Publication number
CN116978176A
CN116978176A CN202310918690.8A CN202310918690A CN116978176A CN 116978176 A CN116978176 A CN 116978176A CN 202310918690 A CN202310918690 A CN 202310918690A CN 116978176 A CN116978176 A CN 116978176A
Authority
CN
China
Prior art keywords
target
information
strategy
alarm
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310918690.8A
Other languages
Chinese (zh)
Other versions
CN116978176B (en
Inventor
杨治国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ljdy Technology Co ltd
Original Assignee
Wuhan Ljdy Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ljdy Technology Co ltd filed Critical Wuhan Ljdy Technology Co ltd
Priority to CN202310918690.8A priority Critical patent/CN116978176B/en
Publication of CN116978176A publication Critical patent/CN116978176A/en
Application granted granted Critical
Publication of CN116978176B publication Critical patent/CN116978176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Social Psychology (AREA)
  • Psychiatry (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses a security monitoring method and a related device for an intelligent community, wherein the method comprises the following steps: acquiring target information to be detected through a preset through device, acquiring a security score of the target information to be detected through a behavior set, and determining a corresponding execution strategy; when the execution strategy is determined to be an alarm strategy, an alarm target is determined according to target information to be detected; determining abnormal behavior information according to the alarm target and generating an alarm strategy; obtaining the high accuracy corresponding to the alarm strategy and sending the abnormal behavior information to an alarm channel; when the execution strategy is determined to be a safety early warning strategy, determining an abnormal target portrait according to the target information to be detected to generate an early warning report, and sending the early warning report to a preset early warning channel. The execution strategy is determined through the security score of the target to be detected, so that the technical effect of reasonably generating corresponding processing strategies with different emergency degrees according to abnormal behaviors is realized.

Description

Intelligent community safety monitoring method and related device
Technical Field
The application relates to the field of community management, in particular to a smart community safety monitoring method and a related device.
Background
With the continuous improvement of the living standard and the living quality of people, the living safety requirement is gradually one focus problem of attention. People are not limited to the comfort of a community, the decoration of a house and the like, and the security management of the community is also becoming more and more concerned, and under the trend, the importance of a monitoring system for the property management of an intelligent community is increasingly highlighted, and the current community monitoring system is provided with monitoring cameras at each monitoring point of the community, wherein the cameras acquire real-time pictures and transmit the real-time pictures to a host computer and a monitoring screen in a monitoring room, the host computer stores the real-time pictures, the monitoring screen displays the real-time pictures, and security personnel usually observe the monitoring screen in the monitoring room to cope with emergency. However, in reality, the condition that the monitoring camera is possibly shielded exists, so that accidents can not be found timely, a lot of time is reserved for accident diffusion, and the living safety of residents is seriously affected.
Therefore, how to intelligently monitor the security of the cell becomes a technical problem to be solved.
Disclosure of Invention
In order to realize intelligent safety monitoring of cells, the application provides an intelligent cell safety monitoring method and a related device.
In a first aspect, the present application provides a method for monitoring security of an intelligent cell, which adopts the following technical scheme:
an intelligent community safety monitoring method comprises the following steps:
acquiring target information to be detected of a target area through a preset sensing device;
acquiring a security score of the target information to be detected through a behavior set, and determining a corresponding execution strategy according to the security score, wherein the execution strategy comprises a timely alarm strategy, a security early warning strategy and a default strategy;
when the execution strategy is determined to be the alarm strategy, determining an alarm target through the target information to be detected;
determining abnormal behavior information according to the alarm target, and generating a corresponding alarm strategy;
acquiring an alarm channel corresponding to the alarm strategy and sending the abnormal behavior information to the alarm channel;
when the execution strategy is determined to be the safety early warning strategy, determining an abnormal target portrait according to the target information to be detected so as to generate an early warning report;
and sending the early warning report to a preset early warning channel.
Optionally, the step of acquiring the target information to be detected of the target area through a preset sensing device includes:
acquiring image information of a target area through a preset sensing device;
determining target factor information in the image information according to a contour detection technology;
acquiring a preset data set and determining useless information in the target factor information;
and updating the image information according to the useless information to acquire target information to be detected.
Optionally, the step of acquiring the security score of the target information to be detected through the behavior set and determining the corresponding execution policy according to the security score includes:
acquiring corresponding behavior information from the target information to be detected;
determining a security score of the target information to be detected according to the behavior set and the behavior information;
and determining a corresponding execution strategy in a preset safety strategy set according to the safety score.
Optionally, the step of determining the corresponding execution policy in the preset security policy set according to the security score includes:
acquiring a preset security policy set, and acquiring an execution policy and score interval information corresponding to the execution policy from the preset security policy set;
acquiring a corresponding relation between the safe score and the score interval;
and determining an execution strategy in the preset security strategy set according to the corresponding relation.
Optionally, the step of determining the alarm target through the target information to be detected includes:
acquiring event identification information corresponding to the alarm strategy;
matching a corresponding target set in the target information to be detected according to the event identification information;
acquiring value weight information of each target in the target set;
and determining an alarm target in the target set according to the preset weight screening conditions and the value weight information of each target.
Optionally, the step of determining abnormal behavior information according to the alarm target and generating a corresponding alarm policy includes:
acquiring alarm object information corresponding to the alarm target;
determining abnormal behavior information according to the alarm object information;
acquiring specific behavior information and behavior grade information from the abnormal behavior information;
and generating a corresponding alarm strategy according to the specific behavior information and the behavior grade information.
Optionally, the step of determining the abnormal target portrait according to the target information to be detected to generate an early warning report includes:
acquiring an abnormal label set in the target information to be detected;
acquiring a preset tag screening rule and updating the preset tag screening rule in the abnormal tag set;
and acquiring the current abnormal label set and determining a target portrait to generate an early warning report.
In a second aspect, the present application provides a smart cell security monitoring device, which is characterized in that the smart cell security monitoring device includes:
the information acquisition module is used for acquiring target information to be detected of a target area through a preset sensing device;
the strategy determining module is used for acquiring the security score of the target information to be detected through the behavior set and determining a corresponding executing strategy according to the security score, wherein the executing strategy comprises a timely alarm strategy, a security early warning strategy and a default strategy;
the alarm target module is used for determining an alarm target through the target information to be detected when the execution strategy is determined to be the alarm strategy;
the alarm strategy module is used for determining abnormal behavior information according to the alarm target and generating a corresponding alarm strategy;
the alarm channel module is used for acquiring an alarm channel corresponding to the alarm strategy and sending the abnormal behavior information to the alarm channel;
the early warning report module is used for determining an abnormal target portrait according to the target information to be detected to generate an early warning report when the execution strategy is determined to be the safety early warning strategy;
and the early warning channel module is used for sending the early warning report to a preset early warning channel.
In a third aspect, the present application provides a computer apparatus, the apparatus comprising: a memory, a processor which, when executing the computer instructions stored by the memory, performs the method as claimed in any one of the preceding claims.
In a fourth aspect, the application provides a computer readable storage medium comprising instructions which, when run on a computer, cause the computer to perform a method as described above.
In summary, the application comprises the following beneficial technical effects:
according to the method, target information to be detected is obtained through a preset through device, the security score of the target information to be detected is obtained through a behavior set, and a corresponding execution strategy is determined; when the execution strategy is determined to be an alarm strategy, an alarm target is determined according to target information to be detected; determining abnormal behavior information according to the alarm target and generating an alarm strategy; obtaining the high accuracy corresponding to the alarm strategy and sending the abnormal behavior information to an alarm channel; when the execution strategy is determined to be a safety early warning strategy, determining an abnormal target portrait according to the target information to be detected to generate an early warning report, and sending the early warning report to a preset early warning channel. The execution strategy is determined through the security score of the target to be detected, so that the technical effect of reasonably generating corresponding processing strategies with different emergency degrees according to abnormal behaviors is realized.
Drawings
FIG. 1 is a schematic diagram of a computer device in a hardware operating environment according to an embodiment of the present application;
FIG. 2 is a flowchart of a first embodiment of the intelligent community security monitoring method of the present application;
fig. 3 is a block diagram of a first embodiment of the intelligent community security monitor apparatus of the present application.
Detailed Description
The present application will be described in further detail below with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Referring to fig. 1, fig. 1 is a schematic diagram of a computer device structure of a hardware running environment according to an embodiment of the present application.
As shown in fig. 1, the computer device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the architecture shown in fig. 1 is not limiting of a computer device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a smart cell security monitor may be included in the memory 1005 as one type of storage medium.
In the computer device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the computer device of the present application may be configured in the computer device, where the computer device invokes the smart cell security monitoring program stored in the memory 1005 through the processor 1001, and executes the smart cell security monitoring method provided by the embodiment of the present application.
An embodiment of the present application provides a smart cell security monitoring method, and referring to fig. 2, fig. 2 is a flowchart of a first embodiment of the smart cell security monitoring method of the present application.
In this embodiment, the smart cell security monitoring method includes the following steps:
step S10: and acquiring target information to be detected of the target area through a preset sensing device.
It should be noted that, the preset sensing device in this embodiment may be an image sensing device, and the behavior information of the target area may be obtained through the preset sensing device. And uploading the acquired information to a computing processing center through a network.
It can be understood that the target area in this embodiment refers to an area that is preset in a specific application scenario and is monitored by the sensing device, for example: and (3) monitoring three areas corresponding to d, e and f by deploying three sets of sensing devices a, b and c in a certain cell A, wherein e, d and f are target areas, and the specific size area of the target areas is controlled according to specific use parameters of the sensing devices.
It is understood that the target information to be detected refers to the related behavior information of the target to be detected, and the behavior information includes static form information and dynamic action information.
Further, in order to improve accuracy of obtaining the target information to be detected, the step of obtaining the target information to be detected of the target area through the preset sensing device includes: acquiring image information of a target area through a preset sensing device; determining target factor information in the image information according to a contour detection technology; acquiring a preset data set and determining useless information in the target factor information; and updating the image information according to the useless information to acquire target information to be detected.
It should be noted that, by using the contour detection technique and continuous detection, it is firstly determined that the target to be detected currently belongs to static state or dynamic state.
In a specific implementation, the preset data set includes specific action requirements or action intervals corresponding to the respective behaviors.
Step S20: and acquiring the security score of the target information to be detected through the behavior set, and determining a corresponding execution strategy according to the security score, wherein the execution strategy comprises a timely alarm strategy, a security early warning strategy and a default strategy.
It should be noted that, the alarm policy is a policy generated in response to a situation that needs to be immediately handled currently, and is generally in response to a relatively urgent event, such as a fire or other accident. The safety early warning strategy is a strategy generated when the potential safety hazard exists but no emergency exists through analysis and judgment of the current situation. The reminding can be effectively carried out through a safety early warning strategy. The default policy is that the current target area has no abnormal event, and the current area is continuously monitored through the default policy.
It is understood that behavior sets are meant to include specific sets of behavior actions and static states. The current monitoring information can be matched through the behavior set to determine corresponding behaviors.
In a specific implementation, determining the security score after determining the specific behavior refers to obtaining the security score corresponding to the current specific behavior. For example: and after the behavior set is matched, determining that the behavior A exists in the target area, and the corresponding security score is 2.
Further, in order to achieve the rationality of executing policy determination, the step of acquiring the security score of the target information to be detected through the behavior set and determining the corresponding executing policy according to the security score includes: acquiring corresponding behavior information from target information to be detected; determining a security score of the target information to be detected according to the behavior set and the behavior information; and determining a corresponding execution strategy in a preset safety strategy set according to the safety score.
It should be noted that, determining the security score according to the behavior set and the behavior information is obtained by matching the behavior information in the behavior set as a traversal condition.
It should be noted that, the step of determining the corresponding execution policy in the preset security policy set according to the security score includes: acquiring a preset safety strategy set, and acquiring an execution strategy and score interval information corresponding to the execution strategy in the preset safety strategy set; acquiring the corresponding relation between the safe score and the score interval; and determining an execution strategy in a preset safety strategy set according to the corresponding relation.
It will be appreciated that determining the score interval information is used to distinguish between the urgency of the current situation, and the distinction between the current situation is achieved by the determined relative position of the final safe score.
Step S30: and when the execution strategy is determined to be the alarm strategy, determining an alarm target through the target information to be detected.
Further, in order to improve the accuracy of determining the alarm target, the step of determining the alarm target through the target information to be detected includes: acquiring event identification information corresponding to an alarm strategy; matching corresponding target sets in target information to be detected according to the event identification information; acquiring value weight information of each target in a target set; and determining the alarm targets in the target set according to the preset weight screening conditions and the value weight information of each target.
Step S40: and determining abnormal behavior information according to the alarm target, and generating a corresponding alarm strategy.
Further, in order to determine abnormal behavior information according to the alarm target and generate a corresponding alarm policy, the method includes: acquiring alarm object information corresponding to an alarm target; determining abnormal behavior information according to the alarm object information; acquiring specific behavior information and behavior grade information from the abnormal behavior information; and generating a corresponding alarm strategy according to the specific behavior information and the behavior grade information.
Step S50: and acquiring an alarm channel corresponding to the alarm strategy and sending the abnormal behavior information to the alarm channel.
Step S60: and when the execution strategy is determined to be a safety early warning strategy, determining an abnormal target portrait according to the target information to be detected so as to generate an early warning report.
Further, in order to determine an abnormal target portrait according to the target information to be detected, the method includes the steps of: acquiring an abnormal label set in target information to be detected; acquiring a preset tag screening rule and updating in an abnormal tag set; and acquiring the current abnormal label set and determining a target portrait to generate an early warning report.
Step S70: and sending the early warning report to a preset early warning channel.
According to the embodiment, target information to be detected is obtained through a preset through device, the security score of the target information to be detected is obtained through a behavior set, and a corresponding execution strategy is determined; when the execution strategy is determined to be an alarm strategy, an alarm target is determined according to target information to be detected; determining abnormal behavior information according to the alarm target and generating an alarm strategy; obtaining the high accuracy corresponding to the alarm strategy and sending the abnormal behavior information to an alarm channel; when the execution strategy is determined to be a safety early warning strategy, determining an abnormal target portrait according to the target information to be detected to generate an early warning report, and sending the early warning report to a preset early warning channel. The execution strategy is determined through the security score of the target to be detected, so that the technical effect of reasonably generating corresponding processing strategies with different emergency degrees according to abnormal behaviors is realized.
In addition, the embodiment of the application also provides a computer readable storage medium, wherein the storage medium stores a program for intelligent cell safety monitoring, and the intelligent cell safety monitoring program realizes the steps of the intelligent cell safety monitoring method when being executed by a processor.
Referring to fig. 3, fig. 3 is a block diagram illustrating a first embodiment of a smart cell security monitoring apparatus according to the present application.
As shown in fig. 3, the smart cell security monitoring device according to the embodiment of the present application includes:
the information acquisition module 10 is used for acquiring target information to be detected of a target area through a preset sensing device;
the policy determining module 20 is configured to obtain a security score of the target information to be detected through the behavior set, and determine a corresponding execution policy according to the security score, where the execution policy includes a timely alarm policy, a security early warning policy, and a default policy;
the alarm target module 30 is configured to determine an alarm target according to target information to be detected when determining that the execution policy is an alarm policy;
the alarm policy module 40 is configured to determine abnormal behavior information according to an alarm target, and generate a corresponding alarm policy;
the alarm channel module 50 is configured to acquire an alarm channel corresponding to the alarm policy and send abnormal behavior information to the alarm channel;
the early warning report module 60 is used for determining an abnormal target portrait according to the target information to be detected to generate an early warning report when the execution strategy is determined to be a safety early warning strategy;
the pre-warning channel module 70 is configured to send a pre-warning report to a preset pre-warning channel.
It should be understood that the foregoing is illustrative only and is not limiting, and that in specific applications, those skilled in the art may set the application as desired, and the application is not limited thereto.
According to the embodiment, target information to be detected is obtained through a preset through device, the security score of the target information to be detected is obtained through a behavior set, and a corresponding execution strategy is determined; when the execution strategy is determined to be an alarm strategy, an alarm target is determined according to target information to be detected; determining abnormal behavior information according to the alarm target and generating an alarm strategy; obtaining the high accuracy corresponding to the alarm strategy and sending the abnormal behavior information to an alarm channel; when the execution strategy is determined to be a safety early warning strategy, determining an abnormal target portrait according to the target information to be detected to generate an early warning report, and sending the early warning report to a preset early warning channel. The execution strategy is determined through the security score of the target to be detected, so that the technical effect of reasonably generating corresponding processing strategies with different emergency degrees according to abnormal behaviors is realized.
In an embodiment, the information obtaining module 10 is further configured to obtain image information of the target area through a preset sensing device; determining target factor information in the image information according to a contour detection technology; acquiring a preset data set and determining useless information in target factor information; and updating the image information according to the useless information to acquire the target information to be detected.
In an embodiment, the policy determining module 20 is further configured to obtain corresponding behavior information from the target information to be detected; determining a security score of the target information to be detected according to the behavior set and the behavior information; and determining a corresponding execution strategy in a preset safety strategy set according to the safety score.
In an embodiment, the policy determining module 20 is further configured to obtain a preset security policy set, and obtain an execution policy and score interval information corresponding to the execution policy in the preset security policy set; acquiring the corresponding relation between the safe score and the score interval; and determining an execution strategy in a preset safety strategy set according to the corresponding relation.
In an embodiment, the alarm target module 30 is further configured to obtain event identification information corresponding to an alarm policy; matching corresponding target sets in target information to be detected according to the event identification information; acquiring value weight information of each target in a target set; and determining the alarm targets in the target set according to the preset weight screening conditions and the value weight information of each target.
In an embodiment, the alarm policy module 40 is further configured to obtain alarm object information corresponding to an alarm target; determining abnormal behavior information according to the alarm object information; acquiring specific behavior information and behavior grade information from the abnormal behavior information; and generating a corresponding alarm strategy according to the specific behavior information and the behavior grade information.
In an embodiment, the early warning report module 60 is further configured to obtain an abnormal label set in the target information to be detected; acquiring a preset tag screening rule and updating in an abnormal tag set; and acquiring the current abnormal label set and determining a target portrait to generate an early warning report.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of the present application, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details not described in detail in this embodiment may refer to the method for intelligent cell security monitoring provided in any embodiment of the present application, which is not described herein.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory)/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method of the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. An intelligent cell security monitoring method, comprising:
acquiring target information to be detected of a target area through a preset sensing device;
acquiring a security score of the target information to be detected through a behavior set, and determining a corresponding execution strategy according to the security score, wherein the execution strategy comprises a timely alarm strategy, a security early warning strategy and a default strategy;
when the execution strategy is determined to be the alarm strategy, determining an alarm target through the target information to be detected;
determining abnormal behavior information according to the alarm target, and generating a corresponding alarm strategy;
acquiring an alarm channel corresponding to the alarm strategy and sending the abnormal behavior information to the alarm channel;
when the execution strategy is determined to be the safety early warning strategy, determining an abnormal target portrait according to the target information to be detected so as to generate an early warning report;
and sending the early warning report to a preset early warning channel.
2. The smart cell security monitoring method according to claim 1, wherein the step of acquiring the target information to be detected of the target area by the preset sensing device comprises:
acquiring image information of a target area through a preset sensing device;
determining target factor information in the image information according to a contour detection technology;
acquiring a preset data set and determining useless information in the target factor information;
and updating the image information according to the useless information to acquire target information to be detected.
3. The method for intelligent cell security monitoring according to claim 1, wherein the step of obtaining the security score of the target information to be detected through the behavior set and determining the corresponding execution policy according to the security score comprises:
acquiring corresponding behavior information from the target information to be detected;
determining a security score of the target information to be detected according to the behavior set and the behavior information;
and determining a corresponding execution strategy in a preset safety strategy set according to the safety score.
4. A method of intelligent cell security monitoring according to claim 3, wherein the step of determining a corresponding execution policy from a set of preset security policies based on the security score comprises:
acquiring a preset security policy set, and acquiring an execution policy and score interval information corresponding to the execution policy from the preset security policy set;
acquiring a corresponding relation between the safe score and the score interval;
and determining an execution strategy in the preset security strategy set according to the corresponding relation.
5. The smart cell security monitoring method as claimed in claim 1, wherein the step of determining the alert target through the target information to be detected comprises:
acquiring event identification information corresponding to the alarm strategy;
matching a corresponding target set in the target information to be detected according to the event identification information;
acquiring value weight information of each target in the target set;
and determining an alarm target in the target set according to the preset weight screening conditions and the value weight information of each target.
6. The method for intelligent cell security monitoring according to claim 1, wherein the step of determining abnormal behavior information according to the alarm target and generating a corresponding alarm policy comprises:
acquiring alarm object information corresponding to the alarm target;
determining abnormal behavior information according to the alarm object information;
acquiring specific behavior information and behavior grade information from the abnormal behavior information;
and generating a corresponding alarm strategy according to the specific behavior information and the behavior grade information.
7. The method for intelligent cell security monitoring according to claim 1, wherein the step of determining an abnormal target representation according to the target information to be detected to generate an early warning report comprises:
acquiring an abnormal label set in the target information to be detected;
acquiring a preset tag screening rule and updating the preset tag screening rule in the abnormal tag set;
and acquiring the current abnormal label set and determining a target portrait to generate an early warning report.
8. An intelligent community safety monitoring device, characterized in that, the intelligent community safety monitoring device includes:
the information acquisition module is used for acquiring target information to be detected of a target area through a preset sensing device;
the strategy determining module is used for acquiring the security score of the target information to be detected through the behavior set and determining a corresponding executing strategy according to the security score, wherein the executing strategy comprises a timely alarm strategy, a security early warning strategy and a default strategy;
the alarm target module is used for determining an alarm target through the target information to be detected when the execution strategy is determined to be the alarm strategy;
the alarm strategy module is used for determining abnormal behavior information according to the alarm target and generating a corresponding alarm strategy;
the alarm channel module is used for acquiring an alarm channel corresponding to the alarm strategy and sending the abnormal behavior information to the alarm channel;
the early warning report module is used for determining an abnormal target portrait according to the target information to be detected to generate an early warning report when the execution strategy is determined to be the safety early warning strategy;
and the early warning channel module is used for sending the early warning report to a preset early warning channel.
9. A computer device, the device comprising: a memory, a processor which, when executing the computer instructions stored by the memory, performs the method of any one of claims 1 to 7.
10. A computer readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 7.
CN202310918690.8A 2023-07-25 2023-07-25 Intelligent community safety monitoring method and related device Active CN116978176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310918690.8A CN116978176B (en) 2023-07-25 2023-07-25 Intelligent community safety monitoring method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310918690.8A CN116978176B (en) 2023-07-25 2023-07-25 Intelligent community safety monitoring method and related device

Publications (2)

Publication Number Publication Date
CN116978176A true CN116978176A (en) 2023-10-31
CN116978176B CN116978176B (en) 2024-08-27

Family

ID=88476172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310918690.8A Active CN116978176B (en) 2023-07-25 2023-07-25 Intelligent community safety monitoring method and related device

Country Status (1)

Country Link
CN (1) CN116978176B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201116A1 (en) * 2007-02-16 2008-08-21 Matsushita Electric Industrial Co., Ltd. Surveillance system and methods
US20110050897A1 (en) * 2009-08-31 2011-03-03 Wesley Kenneth Cobb Visualizing and updating classifications in a video surveillance system
CN111274881A (en) * 2020-01-10 2020-06-12 中国平安财产保险股份有限公司 Driving safety monitoring method and device, computer equipment and storage medium
CN112200081A (en) * 2020-10-10 2021-01-08 平安国际智慧城市科技股份有限公司 Abnormal behavior identification method and device, electronic equipment and storage medium
CN112329621A (en) * 2020-11-04 2021-02-05 青岛以萨数据技术有限公司 Processing method, system, terminal and medium for abnormal behavior early warning data
CN114743141A (en) * 2022-04-07 2022-07-12 安徽晶奇网络科技股份有限公司 Dangerous behavior detection system for intelligent community
CN115497252A (en) * 2022-08-31 2022-12-20 中国建设银行股份有限公司 Early warning method and device for self-service equipment, computer equipment and storage medium
CN115966018A (en) * 2022-12-26 2023-04-14 北京思维实创科技有限公司 Anomaly monitoring method based on machine vision and related device
CN116170566A (en) * 2023-02-02 2023-05-26 深圳市前海逸云科技有限公司 Intelligent building monitoring management method and device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201116A1 (en) * 2007-02-16 2008-08-21 Matsushita Electric Industrial Co., Ltd. Surveillance system and methods
US20110050897A1 (en) * 2009-08-31 2011-03-03 Wesley Kenneth Cobb Visualizing and updating classifications in a video surveillance system
CN111274881A (en) * 2020-01-10 2020-06-12 中国平安财产保险股份有限公司 Driving safety monitoring method and device, computer equipment and storage medium
CN112200081A (en) * 2020-10-10 2021-01-08 平安国际智慧城市科技股份有限公司 Abnormal behavior identification method and device, electronic equipment and storage medium
CN112329621A (en) * 2020-11-04 2021-02-05 青岛以萨数据技术有限公司 Processing method, system, terminal and medium for abnormal behavior early warning data
CN114743141A (en) * 2022-04-07 2022-07-12 安徽晶奇网络科技股份有限公司 Dangerous behavior detection system for intelligent community
CN115497252A (en) * 2022-08-31 2022-12-20 中国建设银行股份有限公司 Early warning method and device for self-service equipment, computer equipment and storage medium
CN115966018A (en) * 2022-12-26 2023-04-14 北京思维实创科技有限公司 Anomaly monitoring method based on machine vision and related device
CN116170566A (en) * 2023-02-02 2023-05-26 深圳市前海逸云科技有限公司 Intelligent building monitoring management method and device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
许国凡;: "智能分析应用倍受期待", 中国公共安全(综合版), no. 20, 15 December 2012 (2012-12-15) *

Also Published As

Publication number Publication date
CN116978176B (en) 2024-08-27

Similar Documents

Publication Publication Date Title
KR102005188B1 (en) Industrial site safety management system based on artificial intelligence using real-time location tracking and Geographic Information System, and method thereof
CN111310562B (en) Vehicle driving risk management and control method based on artificial intelligence and related equipment thereof
CN112950773A (en) Data processing method and device based on building information model and processing server
CN113011833A (en) Safety management method and device for construction site, computer equipment and storage medium
CN112926925A (en) Product supervision method and device, electronic equipment and storage medium
CN112990795A (en) Risk control system and method for road operation area
CN113911872B (en) Fault processing method and system and early warning rescue system
CN116597371A (en) Dangerous object early warning method, system and computer equipment based on image monitoring
CN116978176B (en) Intelligent community safety monitoring method and related device
CN112802288A (en) Comprehensive alarm information pushing method and system, storage medium and computer equipment
CN111770085A (en) Network security system, method, equipment and medium
CN109766816A (en) Monitoring method, device and storage medium
CN115965242A (en) Method, device, equipment and medium for managing and controlling danger source
CN115913652A (en) Abnormal access behavior detection method and device, electronic equipment and readable storage medium
CN114067283A (en) Violation identification method and device, electronic equipment and storage medium
CN116069596A (en) Situation awareness method, system, equipment and storage medium
CN112486573A (en) Data processing method, data processing device and storage medium of monitoring system
US20230401862A1 (en) Information acquisition support apparatus, information acquisition support method, and recording medium storing information acquisition support program
CN110796044A (en) Target area security monitoring method and device
CN111159190A (en) Campus risk analysis system and method based on cloud platform
CN116437046A (en) Construction quality safety monitoring method and related device
CN116611904A (en) Security supervision method and device, computer equipment and storage medium
CN110807344A (en) Special user monitoring method and equipment based on image analysis and storage medium
CN117875924A (en) Service alarm system optimization method, device, computer equipment and storage medium
CN114155364A (en) Image processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant