CN211015806U - Intrusion monitoring system - Google Patents

Intrusion monitoring system Download PDF

Info

Publication number
CN211015806U
CN211015806U CN201921818707.8U CN201921818707U CN211015806U CN 211015806 U CN211015806 U CN 211015806U CN 201921818707 U CN201921818707 U CN 201921818707U CN 211015806 U CN211015806 U CN 211015806U
Authority
CN
China
Prior art keywords
alarm
fence
monitor
electrically connected
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201921818707.8U
Other languages
Chinese (zh)
Inventor
吴亚楠
赵连成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING GUOXINQIAO COMMUNICATION ENGINEERING CO LTD
Original Assignee
BEIJING GUOXINQIAO COMMUNICATION ENGINEERING CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING GUOXINQIAO COMMUNICATION ENGINEERING CO LTD filed Critical BEIJING GUOXINQIAO COMMUNICATION ENGINEERING CO LTD
Priority to CN201921818707.8U priority Critical patent/CN211015806U/en
Application granted granted Critical
Publication of CN211015806U publication Critical patent/CN211015806U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The embodiment of the utility model provides an intrusion monitoring system is related to, the system includes: the system comprises a server, a monitor, a fence, a detector, an alarm device and a closing control device; the monitor is electrically connected with the server and the fence and used for collecting monitoring pictures around the fence; the detector is arranged on the fence and is electrically connected with the server to acquire vibration parameters of the fence; the server includes: an alarm device and a closing control device; the acquisition device is used for acquiring monitoring pictures; the calculation processing device is electrically connected with the acquisition device, and is used for acquiring the monitoring picture and the vibration parameters of the fence to obtain a first alarm position or second alarm information; the alarm device is electrically connected with the computing processing device and sends first alarm information or second alarm information to preset monitor equipment by triggering an alarm and an alarm lamp; and the closing control equipment is electrically connected with the alarm equipment, receives a termination instruction for terminating the alarm and closes the alarm equipment.

Description

Intrusion monitoring system
Technical Field
The utility model relates to the field of communication technology, especially, relate to an invasion monitored control system.
Background
In order to improve security, more and more companies or private areas such as factories select to install intrusion monitoring systems. Not only can the intrusion monitoring system know when and how to enter the private domain.
However, the current intrusion monitoring system only plays a role of monitoring, such as acquiring a picture through a monitor, displaying the picture acquired by the monitor on a monitor of a monitoring room, and then confirming whether a person intrudes into a private area by manually monitoring the picture displayed by the monitor. This approach is very labor intensive for the administrator, and if the administrator is temporarily away or distracted, it is possible that the intrusion situation appearing on the screen may be missed, and the intrusion monitoring system is similar to a dummy one, and its accuracy and safety are not high.
SUMMERY OF THE UTILITY MODEL
The utility model aims at prior art's defect, provide an invasion monitoring system, combine through the vibration parameter with the control picture around the rail and rail, synthesize and judge whether there is the invasion condition to take place, need report an emergency and ask for help or increased vigilance promptly, if needs then directly trigger the warning, effectively improved the accuracy and the security of invasion control.
In order to achieve the above object, in a first aspect, the embodiments of the present invention provide an intrusion monitoring system, including:
the system comprises a server, a monitor, a fence, a detector, an alarm device and a closing control device; wherein,
the monitor is electrically connected with the server and the fence and used for collecting monitoring pictures around the fence;
the detector is arranged on the fence and is electrically connected with the server to acquire vibration parameters of the fence;
the server includes: the device comprises a collecting device and a computing processing device;
the acquisition device is electrically connected with the monitor and acquires the monitoring picture;
the calculation processing device is electrically connected with the acquisition device, and is used for acquiring the monitoring picture and the vibration parameters of the fence to obtain a first alarm position;
the alarm equipment is electrically connected with the computing processing device and sends first alarm information or second alarm information to preset monitor equipment by triggering an alarm and an alarm lamp;
and the closing control equipment is electrically connected with the alarm equipment, receives a termination instruction for terminating the alarm and closes the alarm equipment.
Preferably, the computing processing apparatus further includes:
and the analysis processing chip is connected with the acquisition device to obtain the target suspicious degree parameter.
Further preferably, the computing processing apparatus further includes:
and the acquisition processing chip is connected with the analysis processing chip to acquire the target suspicious degree parameter and obtain the vibration parameter of the fence.
Further preferably, the computing processing apparatus further includes:
and the matching processing chip is connected with the acquisition processing chip, acquires the vibration parameters of the fence and obtains the corresponding relation between the vibration parameters and the scenes.
Further preferably, the computing processing apparatus further includes:
and the first computing chip is connected with the matching processing chip, acquires the corresponding relation between the vibration parameters and the scenes and generates alarm parameters.
Further preferably, the computing processing apparatus further includes:
and the second computing chip is connected with the first computing chip and used for acquiring the alarm parameters to obtain the first alarm information or the second alarm information.
Preferably, the alert device is further configured to:
and when a triggering instruction for triggering alarm is received, third alarm information is sent to the preset monitor equipment by controlling the triggering alarm and the alarm lamp.
Preferably, the detector is plural.
The embodiment of the utility model provides a pair of intrusion detection system, through setting up server, monitor, rail, detector, warning device and closing control equipment, can realize combining the vibration parameter of the control picture around the rail and rail, synthesize and judge whether there is the invasion condition to take place, whether need report an emergency and ask for help or increased vigilance promptly, if needs then directly trigger the warning, effectively improved the accuracy and the security of invasion control.
Drawings
Fig. 1 is a schematic structural diagram of an intrusion monitoring system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an intrusion monitoring method implemented in an intrusion monitoring system according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and examples.
First, an embodiment of the present invention provides an intrusion monitoring system, and fig. 1 is a schematic structural diagram of the intrusion monitoring system. As shown in fig. 1, the system includes: server 101, monitor 102, fence 103, detector 104, alarm device 105, and shutdown control device 106. The server 101 is connected to a monitor 102, a detector 104, an alarm device 105 and a shutdown control device 106, respectively, and the detector 104 is disposed on the fence 103.
Fence 103 may be understood as an electronic fence, typically mounted using a wall or corner. The installation of the detector is basically the same as that of the laser correlation detector; the specific type of detector 104 may be, for example, an infrared curtain detector or the like; the monitor 102 may be, for example, a wide dynamic gun camera, a wide dynamic dome camera, etc.; the alarm device 105 may be understood as a device having an audible and visual alarm function; the shutdown control device 106 can be understood as a device having a control function.
It is understood that the present application does not limit the specific type of the above-mentioned devices, and those skilled in the art can implement the functions of the above-mentioned single devices according to the existing devices, but cannot obtain the connection relationship of the above-mentioned devices without creative efforts, and what the present application needs to protect is the connection relationship between the above-mentioned devices.
Specifically, the monitor 102 is electrically connected to the server 101 and the fence 103, and is configured to collect monitoring pictures around the fence 103.
The detector 104 is disposed on the fence 103 and electrically connected to the server 101 for obtaining vibration parameters of the fence 103.
The server 101 includes: acquisition means 1011 and computational processing means 1012. The acquisition device 1011 is electrically connected with the monitor 102 and is used for acquiring monitoring pictures; and the calculation processing device 1012 is electrically connected with the acquisition device 1011 and is used for acquiring the monitoring picture and the vibration parameters of the fence to obtain a first alarm position.
More specifically, the calculation processing device 1012 includes an analysis processing chip 1013, an acquisition processing chip 1014, a matching processing chip 1015, a first calculation chip 1016, and a second calculation chip 1017.
It is understood that the present application does not limit the specific type of the above chip, and those skilled in the art can implement the functions of the above single chip according to the existing chip, but cannot obtain the connection relationship of the above chip without creative labor, and what the present application needs to protect is the connection relationship between the above chips and other devices.
The acquisition device 1011 is electrically connected to the monitor 102, and is used for acquiring the monitoring picture through the monitor 102.
And the analysis processing chip 1013 is connected to the acquisition device 1011 and is configured to analyze the monitoring picture, determine whether the monitoring picture includes a suspicious target, and obtain a target suspicious degree parameter.
And the obtaining processing chip 1014 is connected to the analyzing processing chip 1013, and is configured to obtain the parameter of the suspicious degree of the target, and if it is determined that the monitoring picture includes the suspicious target, obtain the vibration parameter of the fence through the detector 104.
And the matching processing chip 1015, connected to the obtaining processing chip 1014, is configured to obtain the vibration parameters of the fence, and match the vibration parameters with a preset list, where the list includes a correspondence relationship between the vibration parameters and the scenes.
The first calculating chip 1016 is connected to the matching processing chip 1015, and is configured to obtain a correspondence between the vibration parameter and a scenario, and determine whether a scenario corresponding to the vibration parameter can be matched according to the obtained correspondence between the vibration parameter and the scenario. And if the alarm parameters can be matched with the alarm parameters, determining whether the alarm is needed or not according to the scene, and generating the alarm parameters.
And the second computing chip 1017 is connected to the first computing chip 1016, and is configured to obtain the alarm parameter, determine whether an alarm is required according to the alarm parameter, determine, if an alarm is required, time for acquiring the monitoring screen as first alarm time, and determine a position of the fence 103 as a first alarm position.
And the alarm device 105 is electrically connected with the second computing chip 1017 and is used for triggering an alarm and an alarm lamp and sending first alarm information to preset supervisor equipment, wherein the first alarm information comprises the first alarm time, the first alarm position and the first alarm level.
It should be noted that the second computing chip 1017 is further configured to determine, if the situation corresponding to the vibration parameter is not matched, the time of acquiring the monitoring picture as the first alarm time, and determine the position of the fence 103 as the first alarm position. Accordingly, the alarm device 105 is further configured to send second alarm information to the preset supervisor device, where the second alarm information includes the first alarm time, the first alarm location, and the second alarm level.
A turn-off control device 106, electrically connected to the alarm device 105, for turning off the alarm and the warning lamp when a termination instruction for terminating the alarm is received.
Preferably, the alert device 105 is further configured to: and when a triggering instruction for triggering the alarm is received, triggering the alarm and the alarm lamp, and sending third alarm information to preset monitor equipment.
Preferably, the trigger instruction carries a second alarm time and a second alarm position; the third alarm information includes the second alarm time, the second alarm location and a third alarm level.
Preferably, the detector 104 is plural; so that the acquisition processing chip 1014 is also specifically configured to: a plurality of vibration parameters of the fence 103 are acquired by a plurality of detectors 104 disposed at the fence 103.
In order to better understand the embodiment of the intrusion detection system in the present application, the intrusion detection system in the present application is described below by using an intrusion detection method implemented in the intrusion detection system, and a method flowchart of the intrusion monitoring method is shown in fig. 2, and includes the following steps.
Step 11, collecting monitoring pictures through a monitor;
in particular, the monitor is used for collecting pictures around the fence, so when the monitor is installed, the monitor needs to be installed at a position where the whole fence can be photographed. If one monitor cannot cover the entire pen, multiple monitors can be installed with some overlap of the views of each monitor. Therefore, after the server acquires the monitoring pictures acquired by the monitors, the multiple monitoring pictures need to be synthesized to obtain a complete monitoring picture around the fence.
Step 12, analyzing the monitoring picture to determine whether the monitoring picture includes a suspicious target;
specifically, when analyzing the monitoring picture, the method that can be adopted includes: comparing the currently acquired monitoring frame with the previous monitoring frame, judging whether the currently acquired monitoring frame and the previous monitoring frame change, if so, indicating that suspicious targets appear around the fence, and executing the step 13. If no change occurs, it is indicated that there is no change around the fence, and no suspicious object appears, and the process is terminated.
Step 13, obtaining vibration parameters of the fence through a detector arranged on the fence;
in particular, the fence may be provided with a plurality of detectors, for example, four detectors arranged at four corners. Accordingly, obtaining vibration parameters of the fence via a detector disposed on the fence may include: a plurality of vibration parameters of the fence are obtained by a plurality of detectors arranged on the fence.
Step 14, matching the vibration parameters with a preset list, and determining whether the situation corresponding to the vibration parameters is matched;
specifically, the list includes a correspondence between the vibration parameter and the scene. It should be noted that, if the obtained vibration parameters are multiple, the vibration parameters in the list are multivariate matrices, and each matrix corresponds to one scene. And when the list is matched, matching the acquired multiple vibration parameters as a multivariate matrix.
In one example, the scenario may include: animals touch the fence, people touch the fence, the fence is struck heavily, the fence is destroyed, and the like.
If the scene corresponding to the vibration parameter is matched, step 15 is executed to continue the determination. If the situation corresponding to the vibration parameter is not matched, it indicates that the server cannot accurately determine, so step 108 may be executed to prompt the monitor to perform manual confirmation.
Step 15, determining whether an alarm is needed according to the situation corresponding to the vibration parameter;
specifically, if the scenario corresponding to the vibration parameter is that the fence is heavily hit or damaged, it is determined that an alarm is needed, and step 16 is executed. If the situation corresponding to the vibration parameter is that an animal touches the fence or a person touches the fence, it is determined that no alarm is needed, and the process is ended.
Step 16, determining the time of acquiring the monitoring picture as a first alarm time, and determining the position of the fence as a first alarm position;
step 107, triggering an alarm and an alarm lamp, and sending first alarm information to preset monitor equipment;
specifically, the first alarm information may include the first alarm time, the first alarm location, and the first alarm level.
In an example, the sending of the first warning information to the monitor device may be performed by communication software installed in the server, or may be performed by a short message. Further, if the first warning information is sent through the communication software, the first warning information may further include a monitoring screen.
Step 108, determining the time of acquiring the monitoring picture as a first alarm time, and determining the position of the fence as a first alarm position;
step 109, sending second alarm information to preset monitor equipment;
specifically, the sending of the second warning information to the monitor device may be performed by communication software installed in the server, or may be performed by a short message. Further, if the second warning information is sent through the communication software, the second warning information may further include a monitoring screen.
In this case, the server cannot confirm whether intrusion has indeed occurred, and therefore does not trigger the alarm and the warning lamp, but sends the second warning information to the supervisor device, the second warning information including the first warning time, the first warning location, and the second warning level. It should be noted that the alarm level is for the purpose of letting the monitor know under which condition the alarm information is triggered, that is, when the monitor receives the second alarm information, the monitor can know whether intrusion is to be further confirmed through the second alarm level.
In one example, if the monitor finds that there is an intrusion or confirms that there is an intrusion after the monitor receives the second alarm information, a trigger instruction may be sent to the server by the monitor apparatus to trigger the alarm. And when the server receives a triggering instruction for triggering the alarm, triggering the alarm and the alarm lamp, and sending third alarm information to preset monitor equipment.
In one example, the trigger instruction carries a second alert time and a second alert location. Specifically, when the monitor sends the trigger instruction to the server through the monitor device, the intrusion time (i.e., the second alarm time) and the location (i.e., the second alarm location) confirmed by the monitor may be carried in the trigger instruction. Accordingly, the third alarm information may include a second alarm time, a second alarm location, and a third alarm level. Similarly, the monitor receiving the third alarm information may know that the alarm information is manually triggered through the third alarm level.
In one example, the supervisor may also send a termination instruction to the server via the supervisor device to terminate the alarm. And when the server receives a termination instruction for terminating the alarm, the alarm and the alarm lamp are turned off.
The embodiment of the utility model provides a pair of intrusion detection system, through setting up server, monitor, rail, detector, warning device and closing control equipment, can realize combining the vibration parameter of the control picture around the rail and rail, synthesize and judge whether there is the invasion condition to take place, whether need report an emergency and ask for help or increased vigilance promptly, if needs then directly trigger the warning, effectively improved the accuracy and the security of invasion control.
The above-mentioned embodiments, further detailed description of the objects, technical solutions and advantages of the present invention, it should be understood that the above description is only the embodiments of the present invention, and is not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. An intrusion monitoring system, the system comprising: the system comprises a server, a monitor, a fence, a detector, an alarm device and a closing control device;
the monitor is electrically connected with the server and the fence and used for collecting monitoring pictures around the fence;
the detector is arranged on the fence and is electrically connected with the server to acquire vibration parameters of the fence;
the server includes: the device comprises a collecting device and a computing processing device;
the acquisition device is used for acquiring the monitoring picture;
the calculation processing device is electrically connected with the acquisition device, and is used for acquiring the monitoring picture and the vibration parameters of the fence to obtain a first alarm position or second alarm information;
the alarm equipment is electrically connected with the computing processing device and sends first alarm information or second alarm information to preset monitor equipment by triggering an alarm and an alarm lamp;
and the closing control equipment is electrically connected with the alarm equipment, receives a termination instruction for terminating the alarm and closes the alarm equipment.
2. The system of claim 1, wherein the computing processing device further comprises:
and the analysis processing chip is connected with the acquisition device to obtain the target suspicious degree parameter.
3. The system of claim 2, wherein the computing processing device further comprises:
and the acquisition processing chip is connected with the analysis processing chip to acquire the target suspicious degree parameter and obtain the vibration parameter of the fence.
4. The system of claim 3, wherein the computing processing device further comprises:
and the matching processing chip is connected with the acquisition processing chip, acquires the vibration parameters of the fence and obtains the corresponding relation between the vibration parameters and the scenes.
5. The system of claim 4, wherein the computing processing device further comprises:
and the first computing chip is connected with the matching processing chip, acquires the corresponding relation between the vibration parameters and the scenes and generates alarm parameters.
6. The system of claim 5, wherein the computing processing device further comprises:
and the second computing chip is connected with the first computing chip and used for acquiring the alarm parameters to obtain the first alarm information or the second alarm information.
7. The system of claim 1, wherein the alerting device is further configured to:
and when a triggering instruction for triggering alarm is received, third alarm information is sent to the preset monitor equipment by controlling the triggering alarm and the alarm lamp.
8. The system of claim 1, wherein the detector is a plurality.
CN201921818707.8U 2019-10-25 2019-10-25 Intrusion monitoring system Active CN211015806U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201921818707.8U CN211015806U (en) 2019-10-25 2019-10-25 Intrusion monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201921818707.8U CN211015806U (en) 2019-10-25 2019-10-25 Intrusion monitoring system

Publications (1)

Publication Number Publication Date
CN211015806U true CN211015806U (en) 2020-07-14

Family

ID=71475169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201921818707.8U Active CN211015806U (en) 2019-10-25 2019-10-25 Intrusion monitoring system

Country Status (1)

Country Link
CN (1) CN211015806U (en)

Similar Documents

Publication Publication Date Title
CA2795896C (en) Method and system for security system tampering detection
KR101743386B1 (en) Video monitoring method, device and system
KR101467352B1 (en) location based integrated control system
CN103726879A (en) Method for utilizing camera to automatically capture mine earthquakes and collapses of mine and timely record and alarm
CA2564035A1 (en) Camera tamper detection
EP2779130A2 (en) GPS directed intrusion system with real-time data acquisition
KR101111493B1 (en) Automatic Fire Recognition and Alarm Systems using Intelligent IP Camera and Method Thereof
CA2861370A1 (en) Method of installing pir sensor with camera
KR20100006203A (en) Cultural properties management system and method
CN103810805A (en) Electronic fence control system and control method based in intelligent terminal
KR101005568B1 (en) Intelligent security system
JP2009159448A (en) Object detecting apparatus, and object detecting method
KR101014842B1 (en) Security image monitoring system and method using rfid reader
KR101075550B1 (en) Image sensing agent and security system of USN complex type
KR101138212B1 (en) Fire detecting system and method using image recognition and motion sensor
KR100962612B1 (en) Tracking and watching system using real time distance detecting
CN110691222A (en) Intrusion monitoring method and system
CN111462440A (en) Fire monitoring system and fire monitoring method
CN211015806U (en) Intrusion monitoring system
KR101046819B1 (en) Method and system for watching an intrusion by software fence
KR20140003668A (en) Active monitoring system and method using mobile terminal
CN104702913B (en) The safety control system and device of nuclear power plant
CN114445779B (en) Method, system, equipment and medium for determining safety state of area to be detected
KR101167605B1 (en) Intelligent controller using camera and method thereof
CN104700533A (en) Nuclear safety linkage control method and system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant