CN117351627A - Hydropower station intrusion alarm system based on identity information identification - Google Patents

Hydropower station intrusion alarm system based on identity information identification Download PDF

Info

Publication number
CN117351627A
CN117351627A CN202311296895.3A CN202311296895A CN117351627A CN 117351627 A CN117351627 A CN 117351627A CN 202311296895 A CN202311296895 A CN 202311296895A CN 117351627 A CN117351627 A CN 117351627A
Authority
CN
China
Prior art keywords
intrusion
module
information
interference
alarm system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311296895.3A
Other languages
Chinese (zh)
Inventor
寸金木
闻源
袁涛
杨雪松
高芝国
李刚
胡杰
曾学杰
王亮
何聪慧
张雅琼
王靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaneng Lancang River Hydropower Co Ltd
Original Assignee
Huaneng Lancang River Hydropower Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Lancang River Hydropower Co Ltd filed Critical Huaneng Lancang River Hydropower Co Ltd
Priority to CN202311296895.3A priority Critical patent/CN117351627A/en
Publication of CN117351627A publication Critical patent/CN117351627A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19684Portable terminal, e.g. mobile phone, used for viewing video remotely
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Emergency Management (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a hydropower station intrusion alarm system based on identity information identification, which comprises: the system comprises at least one infrared camera, a monitoring radar, an alarm system, a signal receiver, an identity nameplate reading device, a signal capturing device, an intrusion authentication device and an electronic interference system, wherein the alarm system is connected between the infrared camera and the monitoring radar and can remotely alarm and provide remote monitoring for related users based on a WeChat applet; the infrared camera is connected with the signal receiver and the identity nameplate reading device; the method comprises the following steps of monitoring radar, a signal capturing device, an intrusion authentication device and an electronic interference system. The system can realize synchronous real-time monitoring of people and equipment, can perform paralysis striking treatment aiming at invasive equipment, can realize remote real-time monitoring, and improves the safety of hydropower stations.

Description

Hydropower station intrusion alarm system based on identity information identification
Technical Field
The application relates to the technical field of remote monitoring and early warning, in particular to a hydropower station intrusion alarm system based on identity information identification.
Background
The hydropower station is an important type of power station, the hydropower station consists of a hydraulic system, a mechanical system, an electric energy generating device and the like, is a hydraulic junction project for converting water energy into electric energy, and the sustainable nature of electric energy production requires the water energy of the hydropower station to be utilized uninterruptedly.
Because hydropower stations belong to important infrastructures, once accidents occur, not only can larger economic losses be caused, but also larger harm can be caused to downstream of the hydropower stations, so that monitoring systems are required to be arranged nearby the hydropower stations, illegal personnel invasion is avoided, and damage to hydropower station facilities caused by the illegal personnel is prevented.
In the related art, most of monitoring protection modes of hydropower stations are manual patrol and camera monitoring, and the protection modes are relatively crude, are only suitable for monitoring among people, have limitation in applicable scenes, and are weak in protection capability. For example, if there is remote control intrusion of an unmanned aerial vehicle electronic product, the scheme in the related art is difficult to find and alarm in time, and cannot effectively protect.
Disclosure of Invention
The present application aims to solve, at least to some extent, one of the technical problems in the related art.
Therefore, a first object of the present application is to provide a hydropower station intrusion alarm system based on identity information identification, which can realize synchronous real-time monitoring of people and equipment, and can perform paralysis striking treatment on intrusion equipment, and can also realize remote real-time monitoring, so that the safety of the hydropower station is improved, and the problem that an alarm system of the hydropower station cannot perform intrusion early warning and effective protection on electronic products is solved.
A second object of the present application is to propose an electronic device.
To achieve the above object, a first aspect of the present application provides a hydropower station intrusion alarm system based on identity information identification, the system comprising: at least one infrared camera, a monitoring radar, an alarm system, a signal receiver, an identity nameplate reading device, a signal capturing device, an intrusion authentication device and an electronic interference system, wherein,
the infrared camera is connected with the monitoring radar, the alarm system is respectively connected with the infrared camera and the monitoring radar, and the infrared camera is also connected with the signal receiver and the identity nameplate reading device;
the monitoring radar, the signal capturing device, the intrusion authentication device and the electronic interference system are sequentially connected;
the infrared camera is arranged in the surrounding area of the hydropower station and used for carrying out video monitoring in the target area, and the signal receiver is used for acquiring encryption information in an identity nameplate worn by a user in cooperation with the identity nameplate reading device;
the monitoring radar is used for scanning and detecting the electronic equipment in the target area, the signal capturing device is used for acquiring the encryption information on the electronic equipment, the intrusion authentication device is used for verifying the legitimacy of the electronic equipment according to the encryption information on the electronic equipment, and the electronic interference system is used for preventing the electronic equipment from being intruded in a plurality of interference modes when the electronic equipment is determined to be the intrusion equipment;
and the alarm system is used for carrying out on-site alarm and carrying out remote alarm on related users based on the WeChat applet when the presence of illegal users and the intrusion equipment is verified.
Optionally, in one embodiment of the present application, the alarm system includes: the alarm device is connected with the warning module based on the WeChat applet; the reminding module based on the WeChat applet is used for sending the remote monitoring video of the target area to the mobile terminal after the related user logs in the WeChat applet on the mobile terminal, and sending a remote alarm instruction to the mobile terminal according to the control instruction sent by the alarm device.
Optionally, in one embodiment of the present application, the system further comprises: the information storage module is connected with the alarm system and is used for recording alarm information sent by the alarm system at different times.
Optionally, in one embodiment of the present application, the system further comprises: the encrypted information reading device is characterized in that the infrared camera is connected with the monitoring radar in a bidirectional manner to mutually send monitoring reminding information; the first end of the encryption information reading device is connected with the intrusion authentication device, the second end of the encryption information reading device is connected with the electronic interference system, and the encryption information reading device is used for reading the encryption information sent by the intrusion authentication device and decrypting the encryption information and then returning the decryption information to the intrusion authentication device and the electronic interference system.
Optionally, in an embodiment of the present application, the monitoring radar is connected to a transmitter and a receiver, respectively.
Optionally, in an embodiment of the present application, the alert module based on the WeChat applet includes: the system comprises an account login module, a historical information reading module and a nameplate information replacing module, wherein the account login module is respectively connected with the historical information reading module and the nameplate information replacing module; the history information reading module is used for providing prestored legal identity information for the account login module; and the nameplate information replacing module is used for updating the legal identity information.
Optionally, in an embodiment of the present application, the alert module based on the WeChat applet further includes: the emergency reminding module is connected with the account login module at a first end, and connected with a mobile terminal loudspeaker of a corresponding user at a second end through wireless communication connection; the emergency reminding module is used for controlling the mobile terminal loudspeaker to send reminding information to the corresponding user when the presence of the illegal user and the intrusion equipment is verified.
Optionally, in one embodiment of the present application, the electronic interference system includes: a communication interference module and a device interference module.
Optionally, in one embodiment of the present application, the communication interference module is configured to embed a partial blocking paralysis method, and the communication interference module is configured to perform communication interference on the intrusion device based on the partial blocking paralysis method; the device interference module is internally provided with a modulation interference algorithm, and is used for carrying out narrow-band modulation based on the modulation interference algorithm and sending modulated noise to the intrusion device for interference.
To achieve the above object, a second aspect of the present application further provides an electronic device, including the hydropower station intrusion alarm system based on identity information identification according to any one of the first aspects.
The technical scheme provided by the embodiment of the application at least brings the following beneficial effects: the intrusion prevention system can be used as a subsystem of a hydropower station, plays a role of preventing invasion of external equipment and personnel, is used for omnibearing monitoring, and can prevent invasion of electronic equipment while avoiding man-made invasion. After the intrusion electronic equipment is monitored, the intrusion electronic equipment can be accurately positioned, and interference information is sent out, so that a system of the intrusion equipment is paralyzed, and an intrusion prevention effect is achieved. And the remote real-time monitoring function can be realized while the intrusion alarm is realized, so that manager can monitor the intruder or equipment more efficiently, and the accuracy, applicability and monitoring efficiency of the hydropower station intrusion alarm are improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
fig. 1 is a schematic structural diagram of a hydropower station intrusion alarm system based on identity information identification according to an embodiment of the application;
fig. 2 is a schematic structural diagram of an alarm system according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a reminder module based on a WeChat applet according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic interference system according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
As shown in the figure: 1. an infrared camera; 2. an alarm system; 3. a transmitter; 4. monitoring a radar; 5. a receiver; 6. a signal capturing device; 7. intrusion authentication means; 8. an electronic interference system; 9. an encrypted information reading device; 10. an information storage module; 11. an alarm device; 12. a reminding module based on WeChat applet; 13. a buzzer; 14. a signal receiver; 15. an identity nameplate reading device; 1201. an account login module; 1202. an emergency reminding module; 1203. a history information reading module; 1205. the nameplate information replacing module; 801. a communication interference module; 803. the device interference module.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present invention and should not be construed as limiting the invention.
The hydropower station intrusion alarm system and the electronic equipment based on identity information identification, which are provided by the embodiment of the application, are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a hydropower station intrusion alarm system based on identity information identification according to an embodiment of the present application, as shown in fig. 1, the system includes: at least one infrared camera 1, a monitoring radar 4, an alarm system 2, a signal receiver 14, an identity tag reading device 15, a signal capturing device 6, an intrusion authentication device 7 and an electronic interference system 8.
The alarm system 2 is respectively connected with the infrared camera 1 and the monitoring radar 4, and the infrared camera 1 is also connected with the signal receiver 14 and the identity nameplate reading device 15; the monitoring radar 4, the signal capturing device 6, the intrusion authentication device 7 and the electronic interference system 8 are connected in sequence.
Specifically, as shown in fig. 1, an alarm system 2 is connected between an infrared camera 1 and a monitoring radar 4, a first end of the infrared camera 1 is connected with a first end of the monitoring radar 4, a second end of the infrared camera 1 and a second end of the monitoring radar 4 are connected with the alarm system 2, and a third end of the infrared camera 1 is respectively connected with a signal receiver 14 and an identity nameplate reading device 15. The third end of the monitoring radar 4 is connected to the first end of the signal capturing device 6, the second end of the capturing device 6 is connected to the first end of the intrusion authentication device 7, and the second end of the intrusion authentication device 7 is connected to the first end of the electronic interference system 8.
The infrared camera 1 is arranged in the surrounding area of the hydropower station and used for carrying out video monitoring in a target area, and the signal receiver 14 is used for acquiring encrypted information in an identity nameplate worn by a user in cooperation with the identity nameplate reading device 15.
The electronic device intrusion detection system comprises a monitoring radar 4, a signal capturing device 6, an intrusion authentication device 7 and an electronic interference system 8, wherein the monitoring radar 4 is used for scanning electronic devices in a detection target area, the signal capturing device 6 is used for acquiring encryption information on the electronic devices, the intrusion authentication device 7 is used for verifying the legitimacy of the electronic devices according to the encryption information on the electronic devices, and the electronic interference system 8 is used for preventing the electronic devices from being intruded in a plurality of interference modes when the electronic devices are determined to be intrusion devices.
And the alarm system 2 is used for carrying out on-site alarm and carrying out remote alarm on the related user based on the WeChat applet when the presence of illegal users and invasive equipment is verified.
Specifically, when the hydropower station intrusion alarm system based on identity information identification is used, the hydropower station intrusion alarm system needs to be connected with a main system of a hydropower station to serve as a security subsystem. The infrared camera 1 and the monitoring radar 4 are connected with a hydropower station main system and simultaneously need an external communication module so as to realize communication interaction with the hydropower station main system, and communication functions such as interaction with a mobile terminal of a related worker.
The target area is an area of the hydropower station which needs to be protected. The number of the infrared cameras 1 can be at least 1 according to actual needs, and in practical application, a plurality of infrared cameras can be arranged around the hydropower station to ensure that the working range can cover a target area. When external electronic equipment invades the field (namely a target area) of the hydropower station, the monitoring radar 4 scans and detects the electronic equipment or personnel positioning and reads the encryption information on the electronic equipment through the monitoring radar 4. If the encrypted information does not exist or the encrypted information fails to pass the validity verification, the electronic interference system 8 is started to realize information interference through one or more of the methods of interfering the electronic equipment such as a partial blocking paralysis method, a modulation interference method and the like, so that the external intrusion electronic equipment is paralyzed, and the intrusion prevention function is realized. Meanwhile, when monitoring is carried out aiming at invading personnel, each legal staff in the hydropower station wears an identity nameplate in advance, and the validity of the personnel can be more accurately confirmed by reading the information on the identity nameplate and determining the accuracy and simultaneously assisting in receiving the information through the signal receiver 14 connected with the infrared camera 1.
In a specific implementation, when the signal receiver 14 cooperates with the identity tag reader 15 to obtain the encrypted information in the identity tag worn by the user, as a possible implementation manner, the signal receiver 14 may receive the encrypted information sent by the identity tag worn by the user, and then send the information which is not decrypted to the identity tag reader 15, where the identity tag reader 15 performs related decryption and identity recognition processing according to a built-in algorithm. As another possible implementation manner, the signal receiver 14 may send other types of information for assisting in determining the identity of the user to the identity tag reading device 15 when sending the received information to the identity tag reading device 15, for example, the signal receiver 14 may also send the face recognition result to the identity tag reading device 15 for comprehensive determination through a preset face recognition device to perform face recognition on the video image captured by the infrared camera 1.
Further, when the monitoring radar 4, the signal capturing device 6 and the intrusion authentication device 7 are used for identifying the electronic device, as a possible implementation manner, the monitoring radar 4 scans the electronic device entering the target area, then the signal capturing device 6 obtains the encrypted information transmitted by the electronic device, in this embodiment, a function of transmitting the encrypted information is carried in advance for each legal electronic device in the hydropower station, the signal capturing device 6 sends the received encrypted information to the intrusion authentication device 7 for validity authentication, and if the encrypted information sent by the electronic device is not received or the encrypted information is verified to be wrong, the electronic device is judged to be an illegal device for intrusion.
In the present application, verifying the validity of a user or an electronic device refers to verifying whether the user or the electronic device is a staff or an electronic device belonging to the hydropower station, which is recorded in the hydropower station in advance.
Therefore, based on the two monitoring modes, no matter personnel monitoring or equipment monitoring is performed, once a problem is detected, the alarm system 2 arranged in the hydropower station can give an alarm, and the alarm can be given on a WeChat applet logged in by an administrator, so that the effect of remote monitoring is realized.
The specific implementation process of the monitoring, alarming and protecting functions of the hydropower station intrusion alarm system based on identity information identification and each device in the system are described in detail below.
As described above, the infrared camera 1 is connected with the signal receiver 14, the signal receiver 14 is used for matching with the monitoring radar 4 to receive the encrypted information in the identity nameplate, the infrared camera 1 is connected with the identity nameplate reading device 15, the identity nameplate reading device 15 is used for reading the information sent by the personal nameplate, confirming the identity of the personnel and playing the role of preventing the error attack on the external electronic product, and the identity nameplate is the identity plate containing the personal basic information and having the positioning function, and the identity nameplate is also provided with the miniature signal transmitter, so that the unique encrypted information is transmitted, the identity uniqueness is guaranteed, and the personal identity information can be backed up in the hydropower station total system for judging the accuracy of the personnel.
The monitoring radar 4 is connected with a signal capturing device 6, the signal capturing device 6 is connected with an intrusion authentication device 7, the intrusion authentication device 7 is respectively connected with an electronic interference system 8 and an encrypted information reading 9, all electronic products of the hydropower station are provided with miniature signal transmitters for transmitting encrypted information, and the antitheft effect can be achieved while the error attack is avoided.
In one embodiment of the present application, as shown in fig. 2, the alarm system 2 includes: a buzzer 13, an alarm device 11 and a warning module 12 based on WeChat applet. The alarm device 11 is connected with the alert module 12 based on the WeChat applet, and the alert module 12 based on the WeChat applet is used for sending a remote monitoring video of a target area to the mobile terminal after a related user logs in the WeChat applet on the mobile terminal, and sending a remote alarm instruction to the mobile terminal according to a control instruction sent by the alarm device 11.
Specifically, in the present embodiment, the buzzer 13 generates the voice alarm information and performs the voice alarm at the site where the intrusion alarm system in the hydropower station is located. In addition, a hydropower station early warning WeChat applet is developed in advance, related staff in the hydropower station can remotely log in the WeChat applet through a mobile terminal such as a mobile phone, when the alarm device 11 determines that an intruded person or electronic equipment exists, the alarm module 12 based on the WeChat applet is controlled, a remote alarm instruction is sent to the mobile terminal of the related staff remotely logging in the WeChat applet, and remote alarm can be performed in various modes such as characters or voices. When no intrusion alarm event occurs, the reminding module 12 based on the WeChat applet can send the monitoring information collected by the infrared camera 1 and the monitoring radar 4 to the mobile terminal of the related staff to realize the function of remote monitoring.
In one embodiment of the present application, as shown in fig. 1, the system further includes: and the information storage module 10, wherein the information storage module 10 is connected with the alarm system 2, and the information storage module 10 is used for recording alarm information sent by the alarm system 2 under different time. Specifically, each time the alarm system 2 sends out alarm information, the information storage module 10 records the current time and the corresponding alarm content, and generates historical alarm records at different moments. The user can read the history stored in the information storage module 10, so that the early warning record of the hydropower station can be known and analyzed.
In one embodiment of the present application, as shown in fig. 1, the system further includes: an encrypted information reading device 9. The infrared camera 1 and the monitoring radar 4 are connected in a bidirectional manner to mutually send monitoring reminding information; the first end of the encryption information reading device 9 is connected with the intrusion authentication device 7, the second end of the encryption information reading device 7 is connected with the electronic interference system 8, and the encryption information reading device 7 is used for reading the encryption information sent by the intrusion authentication device 7 and decrypting the encryption information and returning the encryption information to the intrusion authentication device 7 and the electronic interference system 8.
Specifically, in the present embodiment, the infrared camera 1 and the monitoring radar 4 are connected in both directions, and the encrypted information reading 9 is connected to the electronic interference system 8. Because the infrared camera 1 and the monitoring radar 4 are connected in a bidirectional manner, data interaction can be performed, so that when one party detects abnormality, the other party is reminded of performing abnormality detection, and the accuracy and reliability of intrusion detection are ensured. For example, when the monitoring radar 4 monitors that a user enters the target area through scanning, after performing target positioning, the monitoring reminding information can be sent to the infrared camera 1, the monitoring reminding information includes information such as personnel and target positions of an invasion object, the infrared camera 1 receives the information and then turns to a relevant position area to perform video shooting monitoring, and the validity of the personnel is detected through face recognition and other modes.
The encrypted information reading device 9 has the function of information decryption, can read the encrypted information captured by the intrusion authentication device 7, and returns the encrypted information to the intrusion authentication device 7 and the electronic interference system 8 after decryption, the intrusion authentication device 7 compares the decrypted information to authenticate the validity of the current electronic equipment, and the electronic interference system 8 can determine an interference target by combining the objects in the decrypted information, so as to further avoid wrong selection of the interference objects.
In one embodiment of the present application, as shown in fig. 1, the monitoring radar 4 is connected to the transmitter 3 and the receiver 5, respectively, to enable the reception and transmission of the scanning probe signals.
In one embodiment of the present application, as shown in fig. 3, the alert module 12 based on a WeChat applet includes: an account login module 1201, a history information reading module 1203, and a nameplate information replacement module 1205. The account login module 1201 is respectively connected with the history information reading module 1203 and the nameplate information replacing module 1205; a history information reading module 1203 configured to provide the account login module 1201 with prestored legal identity information; the nameplate information replacing module 1205 is configured to update legal identity information.
Specifically, in this embodiment, the alert module 12 based on the WeChat applet includes an account login module 1201, the account login module 1201 is respectively connected with a history information reading module 1203 and a nameplate information replacing module 1205, the basic information of the employee away from the job is replaced by the nameplate information replacing module 1205, the administrator logs in by using the mobile phone number of the administrator and the WeChat of the administrator in the WeChat applet, so that the remote monitoring effect can be realized, and the remote alert effect can also be realized by the emergency alert module 1202 after the intruder or equipment is monitored.
In one embodiment of the present application, as shown in fig. 3, the alert module based on the WeChat applet further includes: an emergency alert module 1202. Wherein a first end of the emergency alert module 1202 is connected to the account login module 1201, and a second end of the emergency alert module 1202 is connected to a mobile terminal speaker of the corresponding user through a wireless communication connection; the emergency alert module 1202 is configured to control the speaker of the mobile terminal to send alert information, such as voice alert information of "please note that there is unknown equipment in the area a" to the corresponding user when it is verified that there is an illegal user and the invasive equipment.
In one embodiment of the present application, as shown in fig. 4, the electronic interference system 8 includes: a communication interference module 801 and a device interference module 803.
Wherein, the communication interference module 801 is internally provided with a partial blocking paralysis method, and the communication interference module 801 is used for carrying out communication interference on the intrusion equipment based on the partial blocking paralysis method; the device interference module 803 is internally provided with a modulation interference algorithm, and the device interference module 803 is used for carrying out narrow-band modulation based on the modulation interference algorithm and sending modulated noise to the intrusion device for interference.
Specifically, in this embodiment, the partial blocking paralysis method is to perform communication interference with respect to an external communication device, so that the communication efficiency is lost, and the use of the method needs to ensure that the intensity of the communication interference is high and the concealment is high. The modulation interference is to select bandwidth, perform narrow-band modulation in the range, and transmit the modulated chaotic white noise to realize the interference to the target equipment. According to the embodiment, the external communication instrument and the unmanned aerial vehicle are interfered by the local blocking paralysis method and the modulation interference, so that the external electronic equipment can be paralyzed after being invaded, and the invasion preventing effect is realized.
Therefore, the method combines various interference methods, and plays a role in preventing invasion while carrying out invasion alarm.
In summary, the hydropower station intrusion alarm system based on identity information identification in the embodiment of the application can be used as a subsystem of a hydropower station as an intrusion prevention system to play a role of preventing intrusion of external equipment and personnel, and the system is used for omnibearing monitoring, so that intrusion of electronic equipment can be prevented while personal intrusion is avoided. After the intrusion electronic equipment is monitored, the intrusion electronic equipment can be accurately positioned, and interference information is sent out, so that a system of the intrusion equipment is paralyzed, and an intrusion prevention effect is achieved. And the remote real-time monitoring function can be realized while the intrusion alarm is realized, so that manager can monitor the intruder or equipment more efficiently, and the accuracy, applicability and monitoring efficiency of the hydropower station intrusion alarm are improved.
In order to implement the foregoing embodiments, the present application further provides an electronic device, and fig. 5 is a schematic structural diagram of the electronic device according to the embodiment of the present application. As shown in fig. 5, the electronic device 100 includes a hydropower station intrusion alert system 200 according to any one of the above embodiments based on identity information identification.
Specifically, in one embodiment of the present application, the electronic device 100 may be an electrical device preset in a hydropower station for early warning and protecting against external intrusion, and the hydropower station intrusion alarm system 200 based on identity information identification described in the foregoing embodiment is pre-installed in the electronic device 100.
It can be appreciated that, because the electronic equipment of the embodiment of the application is provided with the hydropower station intrusion alarm system based on identity information identification, synchronous real-time monitoring of people and equipment can be realized, paralysis striking treatment can be performed on the intrusion equipment, remote real-time monitoring can be realized, and safety of the hydropower station is improved.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "plurality" is at least two, such as two, three, etc., unless explicitly defined otherwise.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; either directly or indirectly, through intermediaries, or both, may be in communication with each other or in interaction with each other, unless expressly defined otherwise. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
In the present invention, unless expressly stated or limited otherwise, a first feature "up" or "down" a second feature may be the first and second features in direct contact, or the first and second features in indirect contact via an intervening medium. Moreover, a first feature being "above," "over" and "on" a second feature may be a first feature being directly above or obliquely above the second feature, or simply indicating that the first feature is level higher than the second feature. The first feature being "under", "below" and "beneath" the second feature may be the first feature being directly under or obliquely below the second feature, or simply indicating that the first feature is less level than the second feature.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. As with the other embodiments, if implemented in hardware, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.

Claims (10)

1. Hydropower station intrusion alarm system based on identity information identification, which is characterized by comprising: at least one infrared camera, a monitoring radar, an alarm system, a signal receiver, an identity nameplate reading device, a signal capturing device, an intrusion authentication device and an electronic interference system, wherein,
the infrared camera is connected with the monitoring radar, the alarm system is respectively connected with the infrared camera and the monitoring radar, and the infrared camera is also connected with the signal receiver and the identity nameplate reading device;
the monitoring radar, the signal capturing device, the intrusion authentication device and the electronic interference system are sequentially connected;
the infrared camera is arranged in the surrounding area of the hydropower station and used for carrying out video monitoring in the target area, and the signal receiver is used for acquiring encryption information in an identity nameplate worn by a user in cooperation with the identity nameplate reading device;
the monitoring radar is used for scanning and detecting the electronic equipment in the target area, the signal capturing device is used for acquiring the encryption information on the electronic equipment, the intrusion authentication device is used for verifying the legitimacy of the electronic equipment according to the encryption information on the electronic equipment, and the electronic interference system is used for preventing the electronic equipment from being intruded in a plurality of interference modes when the electronic equipment is determined to be the intrusion equipment;
and the alarm system is used for carrying out on-site alarm and carrying out remote alarm on related users based on the WeChat applet when the presence of illegal users and the intrusion equipment is verified.
2. The identity information based hydropower station intrusion alarm system according to claim 1, wherein the alarm system comprises: the alarm comprises a buzzer, an alarm device and a reminding module based on a WeChat applet, wherein,
the alarm device is connected with the reminding module based on the WeChat applet;
the reminding module based on the WeChat applet is used for sending the remote monitoring video of the target area to the mobile terminal after the related user logs in the WeChat applet on the mobile terminal, and sending a remote alarm instruction to the mobile terminal according to the control instruction sent by the alarm device.
3. The identity information based hydropower station intrusion alarm system according to claim 2, further comprising: an information storage module, wherein,
the information storage module is connected with the alarm system and is used for recording alarm information sent by the alarm system at different times.
4. The identity information based hydropower station intrusion alarm system according to claim 1, further comprising: an encrypted information reading apparatus, wherein,
the infrared camera is connected with the monitoring radar in a bidirectional manner to mutually send monitoring reminding information;
the first end of the encryption information reading device is connected with the intrusion authentication device, the second end of the encryption information reading device is connected with the electronic interference system, and the encryption information reading device is used for reading the encryption information sent by the intrusion authentication device and decrypting the encryption information and then returning the decryption information to the intrusion authentication device and the electronic interference system.
5. The hydropower station intrusion alarm system based on identity information identification according to claim 1, wherein the monitoring radar is connected with a transmitter and a receiver respectively.
6. The hydropower station intrusion alarm system based on identity information identification according to claim 2, wherein the alert module based on WeChat applet comprises: an account login module, a history information reading module and a nameplate information replacing module, wherein,
the account login module is respectively connected with the history information reading module and the nameplate information replacing module;
the history information reading module is used for providing prestored legal identity information for the account login module;
and the nameplate information replacing module is used for updating the legal identity information.
7. The identity information recognition-based hydropower station intrusion alarm system according to claim 6, wherein the WeChat applet-based reminder module further comprises: an emergency alert module, wherein,
the first end of the emergency reminding module is connected with the account login module, and the second end of the emergency reminding module is connected with a mobile terminal loudspeaker of a corresponding user through wireless communication connection;
the emergency reminding module is used for controlling the mobile terminal loudspeaker to send reminding information to the corresponding user when the presence of the illegal user and the intrusion equipment is verified.
8. The identity information based hydropower station intrusion alarm system according to claim 1, wherein the electronic interference system comprises: a communication interference module and a device interference module.
9. The hydropower station intrusion alarm system based on identity information identification according to claim 8, wherein the communication interference module is built-in with a partial blocking paralysis method, and the communication interference module is used for performing communication interference on the intrusion device based on the partial blocking paralysis method;
the device interference module is internally provided with a modulation interference algorithm, and is used for carrying out narrow-band modulation based on the modulation interference algorithm and sending modulated noise to the intrusion device for interference.
10. An electronic device comprising a hydropower station intrusion alarm system based on identity information identification according to any one of claims 1-9.
CN202311296895.3A 2023-10-08 2023-10-08 Hydropower station intrusion alarm system based on identity information identification Pending CN117351627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311296895.3A CN117351627A (en) 2023-10-08 2023-10-08 Hydropower station intrusion alarm system based on identity information identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311296895.3A CN117351627A (en) 2023-10-08 2023-10-08 Hydropower station intrusion alarm system based on identity information identification

Publications (1)

Publication Number Publication Date
CN117351627A true CN117351627A (en) 2024-01-05

Family

ID=89364364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311296895.3A Pending CN117351627A (en) 2023-10-08 2023-10-08 Hydropower station intrusion alarm system based on identity information identification

Country Status (1)

Country Link
CN (1) CN117351627A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106839882A (en) * 2017-01-22 2017-06-13 张红彬 Special area invades unmanned plane early warning interceptor control system
KR102227468B1 (en) * 2020-07-16 2021-03-15 주식회사 숨비 Smart counter drone operation system
CN113506417A (en) * 2021-07-19 2021-10-15 中国铁道科学研究院集团有限公司电子计算技术研究所 Railway platform end alarm device
CN113872725A (en) * 2021-10-20 2021-12-31 众芯汉创(北京)科技有限公司 Radio anti-jamming system applied to substation unmanned aerial vehicle safety defense
CN116311736A (en) * 2023-04-10 2023-06-23 四川惟邦新创科技有限公司 Security protection early warning system and method for omnibearing intrusion monitoring

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106839882A (en) * 2017-01-22 2017-06-13 张红彬 Special area invades unmanned plane early warning interceptor control system
KR102227468B1 (en) * 2020-07-16 2021-03-15 주식회사 숨비 Smart counter drone operation system
CN113506417A (en) * 2021-07-19 2021-10-15 中国铁道科学研究院集团有限公司电子计算技术研究所 Railway platform end alarm device
CN113872725A (en) * 2021-10-20 2021-12-31 众芯汉创(北京)科技有限公司 Radio anti-jamming system applied to substation unmanned aerial vehicle safety defense
CN116311736A (en) * 2023-04-10 2023-06-23 四川惟邦新创科技有限公司 Security protection early warning system and method for omnibearing intrusion monitoring

Similar Documents

Publication Publication Date Title
CN108600236B (en) Intelligent information safety comprehensive management system of video monitoring network
CN102084369B (en) For monitoring the system used the unauthorized of equipment
CN108632276B (en) Computer network information safety system
US7295112B2 (en) Integral security apparatus for remotely placed network devices
US20100180350A1 (en) Electronic security device for monitoring computer equipment, associated assemblies and methods
CN102084371A (en) System for mitigating the unauthorized use of a device
CN104967825A (en) Gatekeeper electronic dog system
KR20120074892A (en) Black box for vehicle and access certifiantion method thereof
BG65436B1 (en) Remote alarm system for surveilance of persons with limited freedom of movement
CN105469476B (en) A kind of building safety protection management method and system
CN104616371A (en) Access control video linkage monitoring method and system
CN102708661A (en) Remote video monitoring alarm system and method
CN105608763A (en) Antitheft control method, device and system, server and mobile terminal
CN102518354A (en) Weapon management system and method
CN104766422B (en) Perimeter intruder monitoring system and method
KR20020000473A (en) Safe guarding system using internet
CN104574732A (en) Vibrating-optical-fiber-technology-based perimeter intrusion monitoring system
CN111815887A (en) Security warning system
CN117351627A (en) Hydropower station intrusion alarm system based on identity information identification
JP2006503377A (en) System and method for authenticating a livefeed from a surveillance system
JP2008153852A (en) Electric power line carrier system and its power supply device, electric lock device, and server
JPH11328546A (en) Steel tower monitor system
KR20200044223A (en) Security service system using IOT-based smart door lock
CN111275850A (en) Access control method and system
CN210573994U (en) Networking type access control mainboard based on security chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination