CN213070103U - Safety monitoring system - Google Patents
Safety monitoring system Download PDFInfo
- Publication number
- CN213070103U CN213070103U CN202021962609.4U CN202021962609U CN213070103U CN 213070103 U CN213070103 U CN 213070103U CN 202021962609 U CN202021962609 U CN 202021962609U CN 213070103 U CN213070103 U CN 213070103U
- Authority
- CN
- China
- Prior art keywords
- image
- receiver
- alarm
- transmitter
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model discloses a safety monitoring system belongs to the anti-theft device field. Through the cooperation of each device in the safety monitoring system, can place when first electronic equipment leaves the computer lab, send out the police dispatch newspaper through the alarm to remind computer lab managers to have first electronic equipment to leave the computer lab, the managers of being convenient for takes measures to retrieve the electronic equipment who leaves the computer lab, has improved first electronic equipment's security. Meanwhile, for developers, when the first electronic equipment in the cabinet is maintained, the security monitoring system is unaware, and the developers can normally maintain the first electronic equipment. That is to say, adopt the utility model provides a technical scheme can improve electronic equipment's maintenance efficiency under the prerequisite of protection first electronic equipment safety.
Description
Technical Field
The utility model relates to an anti-theft device field especially relates to a safety monitoring system.
Background
With the development of computer technology, the number of applications capable of running on electronic devices is increasing, and developers need to test multiple electronic devices when developing applications, the electronic devices for testing applications are often stored in a machine room, and developers can remotely control multiple electronic devices in the machine room to test and can perform short-distance maintenance in the machine room. Because the number of electronic devices stored in the computer room is large, anti-theft measures are required to ensure the safety of the electronic devices.
In the related art, a cabinet for placing electronic equipment in a machine room is often locked, that is, when the electronic equipment in the cabinet needs to be maintained in a short distance, a developer needs to open a physical lock on the cabinet first to perform the short-distance maintenance on the electronic equipment.
However, since the electronic device is frequently maintained in a short distance, the use of a physical lock to prevent theft increases the time and cost for developers to maintain the electronic device, and reduces the maintenance efficiency of the electronic device.
SUMMERY OF THE UTILITY MODEL
The utility model provides a safety monitoring system can improve electronic equipment's maintenance efficiency under the prerequisite of protection electronic equipment safety. The technical scheme of the utility model as follows:
in one aspect, a machine room security system is provided, comprising: the system comprises at least one piece of first electronic equipment, a detection device and an alarm device;
the first electronic device comprises a device identification transmitter for broadcasting a device identification of the first electronic device;
the detection device comprises an equipment identifier receiver, a processor and an alarm signal transmitter, wherein the processor is respectively electrically connected with the equipment identifier receiver and the alarm signal transmitter;
the device identification receiver is used for receiving the device identification broadcast by any device identification transmitter;
the processor is configured to compare a first device identifier group with the device identifiers received by the device identifier receiver, where the first device identifier group is composed of the device identifiers of the at least one first electronic device;
the alarm signal transmitter is used for responding to a first signal sent by the processor and transmitting a first alarm signal, wherein the first signal is triggered by that any equipment identifier in the first equipment identifier group is not received by the equipment identifier receiver;
alarm device includes alarm signal receiver and alarm, alarm signal receiver with alarm electric connection, alarm signal receiver with alarm signal sends the ware communication connection, alarm signal receiver is used for responding to and receives alarm signal, through the alarm sends out the police dispatch newspaper.
In one possible design, the detection device further includes a beacon transmitter and a power receiver, and the beacon transmitter and the power receiver are respectively electrically connected to the processor;
the first electronic device further comprises a beacon receiver electrically connected with the device identification transmitter;
the beacon transmitter is used for broadcasting a beacon;
the beacon receiver is used for receiving the beacon;
the device identification transmitter is further configured to broadcast a receive power at which the beacon receiver receives the beacon;
the power receiver is used for receiving the received power;
the processor is further configured to determine a distance between the first electronic device and the probe apparatus based on the received power and a transmit power when the beacon is broadcast by the beacon transmitter.
In one possible design, the processor is further configured to compare a second device identifier group with the device identifiers received by the device identifier receiver, where the second device identifier group is composed of device identifiers of second electronic devices with access rights;
the alarm signal transmitter is further configured to transmit a second alarm signal in response to a second signal transmitted by the processor, the second signal being triggered by the device identifier received by the device identifier receiver not being present in the second device identifier group.
In one possible design, the machine room security system further includes: the monitoring device comprises an image acquirer and an image recognizer, wherein the image acquirer is electrically connected with the image recognizer;
the image acquirer is used for acquiring an image of the position of the at least one piece of first electronic equipment;
the image recognizer is in communication connection with the alarm signal receiver;
the image recognizer is used for responding to the image acquired by the image acquirer and including the target object, and sending a third alarm signal.
In one possible design, the machine room security system further comprises a management device, wherein the management device comprises an image receiver and an image display, and the image receiver is electrically connected with the image display;
the monitoring device further comprises an image transmitter, the image transmitter is electrically connected with the image acquirer, and the image transmitter is in communication connection with the image receiver;
the image transmitter is used for transmitting the image acquired by the image acquirer to the image receiver;
the image display is used for displaying the image received by the image receiver.
In one possible design, the management device further includes an image identifier electrically connected to the image display and the image receiver, respectively;
the image identifier is used for identifying the target object in the image displayed by the image display.
In one possible design, the detection device is a WiFi probe.
In one possible design, the machine room security system further includes: the equipment comprises a central control machine and a cabinet, wherein the cabinet is used for placing the at least one piece of first electronic equipment;
the central control machine is connected with a first end of a connecting line of the cabinet, the central control machine is used for recording the connection state of the connecting line, and a second end of the connecting line is used for connecting the first electronic equipment.
In one possible design, the cabinet comprises an identity recognizer and a cabinet door opener, the identity recognizer is electrically connected with the cabinet door opener, and the cabinet door opener is connected with a cabinet door of the cabinet;
the identity recognizer is used for recognizing the user in front of the cabinet;
the cabinet opener is used for responding to the identity recognizer to recognize a legal user and controlling the cabinet door of the cabinet to open.
In one possible design, the identity identifier is communicatively coupled to the alert signal receiver, and the identity identifier is further configured to send a fourth alert signal in response to the number of times an illegal user is identified to reach the target threshold.
Through the embodiment of the utility model provides a technical scheme, through the cooperation of each device in the safety monitoring system, can place when first electronic equipment leaves the computer lab, send out the police dispatch newspaper through the alarm to remind computer lab managers to have first electronic equipment to leave the computer lab, the managers of being convenient for takes measures to retrieve the electronic equipment who leaves the computer lab, has improved first electronic equipment's security. Meanwhile, for developers, when the first electronic equipment in the cabinet is maintained, the security monitoring system is unaware, and the developers can normally maintain the first electronic equipment. That is to say, adopt the utility model provides a technical scheme can improve electronic equipment's maintenance efficiency under the prerequisite of protection first electronic equipment safety.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and, together with the description, serve to explain the principles of the invention and are not to constitute an undue limitation on the invention.
FIG. 1 is a block diagram illustrating a machine room security system in accordance with an exemplary embodiment;
FIG. 2 is a schematic diagram illustrating a determination of a location of a first electronic device in accordance with an exemplary embodiment;
FIG. 3 is a schematic illustration of a monitoring device installation location shown in accordance with an exemplary embodiment;
FIG. 4 is a diagram illustrating a display interface according to an exemplary embodiment.
Detailed Description
In order to make the technical solutions of the present invention better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples consistent with certain aspects of the invention, as detailed in the following claims.
In order to facilitate a clearer understanding of the contents of the present invention, the usage scenario of the present invention is first explained:
in order to test whether a developed application program can run on different types of electronic devices, a developer of the application program often sets a machine room for testing the application program, the machine room is provided with at least one cabinet, the cabinet is internally provided with different types of first electronic devices, the first electronic devices in the cabinet are electrically connected or in communication connection with a central control machine, and the central control machine can send a test instruction to the first electronic devices and also can receive a test result returned by the first electronic devices. The test terminal used by the developer can establish network connection with the central control machine, send a test instruction to the central control machine through the test terminal, and transmit the test instruction to different first electronic equipment through the central control machine. Of course, the developer can also enter the computer room to check the operation condition of the first electronic equipment in the cabinet in a short distance.
Besides, for the electronic device developers, in addition to testing whether the first electronic device can normally run the application program, the electronic device developers also need to test the natural environment that the first electronic device can adapt to, for example, testing whether the first electronic device can normally run under extremely hot and extremely cold conditions. When testing the natural environment that first electronic equipment can adapt to, also need put into the rack with first electronic equipment, simulate different extreme environment through other facilities in rack or the computer lab, the operation condition of first electronic equipment can be observed to remote or entering computer lab to the testing personnel.
No matter to the developer of application or the developer of electronic equipment, all can adopt the utility model provides a safety monitoring system protects the safety of first electronic equipment in the rack.
Of course, in some cases, it may be possible that the first electronic device is not placed in a dedicated machine room, but is placed in a public place, and in this case, the safety of the first electronic device can also be protected by the safety monitoring system provided by the present invention.
For example, the utility model provides a safety monitoring system can be applied to in the scene of cell-phone shop sales handset, perhaps is applied to in the company is equipped with the scene that does not allow to take away from the first electronic equipment of office for the staff, of course, also can be applied to in other scenes that need monitor first electronic equipment, the embodiment of the utility model provides a do not limit to this.
Referring to fig. 1, the utility model provides a safety monitoring system, include: at least one first electronic device 1, a detection device 2 and an alarm device 3. The first electronic device 1 comprises a device identification transmitter for broadcasting a device identification of the first electronic device 1. The detection device 2 comprises an equipment identifier receiver, a processor and an alarm signal transmitter, wherein the processor is electrically connected with the equipment identifier receiver and the alarm signal transmitter respectively. The device identification receiver is used for receiving the device identification broadcast by any device identification transmitter. The processor is configured to compare the first device identifier group with the device identifiers received by the device identifier receiver, where the first device identifier group is composed of device identifiers of at least one first electronic device 1. The alarm signal transmitter is used for responding to a first signal sent by the processor and transmitting a first alarm signal, wherein the first signal is triggered by the fact that any device identification in the first device identification group is not received by the device identification receiver. Alarm device 3 includes alarm signal receiver and alarm, alarm signal receiver and alarm electric connection, and alarm signal receiver and alarm signal send ware communication connection, and alarm signal receiver is used for responding to and receives alarm signal, sends out the police dispatch newspaper through the alarm.
Optionally, first electronic equipment 1 is cell-phone, panel computer, vehicle mounted terminal and other electronic equipment that have the network connection function, the embodiment of the utility model provides a do not restrict to the type of first electronic equipment 1. The device identifier of the first electronic device 1 is a Media Access Control Address (MAC) of the first electronic device, and may also be a device identifier of another type along with the development of scientific technology, which is not limited by the embodiment of the present invention.
In one possible design, the first electronic device 1 is placed in a cabinet 4 in a machine room, the cabinet 4 comprising a plurality of compartments, the first electronic device 1 being placed on the compartments. The detection device 2 is arranged at a hidden position in the machine room, for example, at a corner of the machine room, or in a ceiling of the machine room, or in a floor of the machine room, or at other positions in the machine room, which is not limited by the embodiment of the present invention. Alternatively, the alarm device 3 is provided on the ceiling of the machine room, and the alarm device can directly emit an alarm sound or an alarm flash to threaten a person who does not have an authority to enter the machine room or to draw attention of a manager, in addition to the alarm to the management apparatus 5.
Following the utility model provides a computer lab security system's theory of operation explains:
taking the first electronic device 1 as a mobile phone, where the mobile phone has a WiFi transmitting device, that is, a device identifier transmitter, and the detecting device 2 is a WiFi Probe as an example, a manager can start a wireless network connection function of the mobile phone, and after the wireless network connection function of the mobile phone is started, the mobile phone can broadcast a management frame (Probe Request) to the outside, where the management frame carries an MAC address of the mobile phone, and the MAC address is also a device identifier of the mobile phone. The manager can add the MAC address of the cell phone placed in the cabinet to the WiFi probe, and the set of the MAC addresses of the cell phones placed in the cabinet is also the first device identifier group, which may also be referred to as a white list. The WiFi probe can acquire a management frame broadcasted by the mobile phone, and the MAC address of the mobile phone is acquired from the management frame. The WiFi probe can compare the obtained MAC addresses with the first equipment identification group, and determine whether the MAC addresses in the first equipment identification group exist in the obtained MAC addresses. In response to any MAC address in the first device identification group not being acquired, the WiFi probe can send a first alarm signal to the alarm device 3. After receiving the first alarm signal, the signal receiver of the alarm device 3 can forward the first alarm signal to the alarm, and the alarm can send out audible and visual alarms to threaten personnel who do not have permission to enter the machine room and also can draw attention of managers.
Alternatively, the alarm device 3 can send an alarm to the management apparatus 5 in addition to being able to issue an alarm through an alarm.
The management device 5 is an electronic device disposed in a management room of the computer room, the electronic device is a desktop computer, a notebook computer, or other types of electronic devices, of course, the management device 5 may also be a mobile terminal carried by a manager, and the manager can check the situation in the computer room through the mobile terminal.
If the management device 5 is an electronic device installed in a management room of a computer room, the electronic device can display warning information to remind a manager, and if the electronic device includes a speaker, the electronic device can also emit sound to remind the manager. If the management device 5 is a mobile terminal carried by a manager, the alarm device 3 can send an alarm to the mobile terminal carried by the manager, after receiving the alarm, the mobile terminal carried by the manager can display prompt information, make a prompt sound or vibrate, and the manager can know that the mobile phone in the cabinet 4 leaves the machine room through the mobile terminal in time, so that corresponding measures are taken. Certainly, in some cases, the developer needs to take the mobile phone in the cabinet 4 away from the machine room for testing, the developer can apply for the management staff, submit the device identifier of the mobile phone that needs to be taken away from the machine room for testing, and the management staff can approve or reject the application of the developer through the management device 5. If the manager agrees to leave the machine room with the mobile phone by the manager through the management device 5, the developer can leave the machine room with the mobile phone without triggering an alarm.
In one possible design, the detecting device 2 further includes a beacon transmitter and a power receiver, and the beacon transmitter and the power receiver are respectively electrically connected to the processor. The first electronic device further comprises a beacon receiver electrically connected with the device identification transmitter. The beacon transmitter is used for broadcasting beacons. The beacon receiver is used for receiving a beacon. The device identification transmitter is also used to broadcast the received power at which the beacon receiver receives the beacon. A power receiver for receiving the received power. The processor is also arranged to determine the distance between the first electronic device and the probing apparatus 2 based on the received power and the transmitted power when the beacon is broadcast by the beacon transmitter.
Under the design, the processor can determine the distance between the first electronic device 1 and the detection device 2 in real time according to the received power and the transmitted power, and a manager can find abnormal conditions in time by checking the distance between the first electronic device 1 and the detection device 2.
Taking the first electronic device 1 as a mobile phone, where the mobile phone has a WiFi transmitting device, that is, a device identifier transmitter, and the detecting device 2 is a WiFi probe as an example, the WiFi probe can broadcast a Beacon frame (Beacon frame) to the outside through the Beacon transmitter, and after the mobile phone receives the Beacon frame broadcasted by the WiFi probe through the Beacon receiver, the mobile phone can broadcast the received power of the received Beacon frame through the device identifier transmitter. The WiFi probe can receive the received power through the power receiver, and the processor determines the distance between the mobile phone and the WiFi probe according to the ratio of the received power to the transmitting power when the beacon frame is transmitted.
Optionally, the WiFi probe can send the distance between the mobile phone and the WiFi probe to the management device 5, and the manager can check the distance between the mobile phone and the WiFi probe through the management device 5.
Besides being able to determine the distance between the first electronic device 1 and the detecting means 2 by the detecting means 2, it is also possible to determine the position of the first electronic device 1 by using 3 detecting means 2, which will be explained below:
3 detection device 2 sets up in the different positions of computer lab, and every detection device 2's detection scope homoenergetic covers whole computer lab. The security system of the machine room further comprises a position determining device, and coordinates of 3 detection devices 2 in the machine room are stored in the position determining device. The 3 detection devices 2 are respectively connected with the position determination device in a communication way. The 3 detection means 2 are able to determine the distance to the first electronic device 1 and to send the determined 3 distances to the position determination means, respectively. The position determining device determines the position of the first electronic device 1 according to the position coordinates of the 3 detecting devices in the machine room and the distance between the first electronic device 1 and the 3 detecting devices 2. Referring to fig. 2, 201, 202, and 203 are 3 detecting devices, respectively, and 1 is a first electronic device. 2011 is a circle with the detecting device 201 as the center, the distance between the first electronic device 1 and the detecting device 201 as the radius, 2021 is a circle with the detecting device 202 as the center, the distance between the first electronic device 1 and the detecting device 202 as the radius, 2031 is a circle with the detecting device 203 as the center, the distance between the first electronic device 1 and the detecting device 203 as the radius, and the intersection of the three circles is also the position of the first electronic device 1.
In a possible design, the processor is further configured to determine, in response to not receiving the device identifier of any first electronic device 1 in the first device identifier group, a distance between any first electronic device 1 and the detecting apparatus 2 at a target time, where the target time is a time before the device identifier of any first electronic device 1 is not received.
Based on the design, the processor can send the device identifier of the first electronic device 1 and the distance between the electronic device 2 and the detection device 2 at the target moment to the management device 5, and the machine room maintenance personnel can check the identifier of the electronic device 2 and the distance between the electronic device 2 and the detection device 2 through the management device 5 to determine the approximate position of the electronic device 2, thereby realizing the tracking of the electronic device 2. Of course, if 3 detection devices 2 are disposed at different positions in the computer room, the position determination device can also send the position of the electronic device 2 to the management device 5, so as to realize more accurate tracking of the electronic device 2.
Under the design, if the detection device 2 does not receive the identifier of any first electronic device 1 in the first device identifier group, the detection device 2 can determine that the first electronic device 1 leaves the machine room, and the detection device 2 can determine the position of the first electronic device 1 before leaving the machine room, so that a machine room maintenance worker can track the first electronic device 1.
In one possible design, the processor is further configured to compare a second device identifier group with the device identifiers received by the device identifier receiver, where the second device identifier group is composed of device identifiers of second electronic devices having access rights. The alert signal transmitter is further configured to transmit a second alert signal in response to the second signal transmitted by the processor, the second signal being triggered by the device identification received by the device identification receiver not being present in the second device identification group.
With this design, the processor can issue an alarm when the first electronic device 1 placed in the cabinet 4 leaves the machine room, and also issue an alarm when a second electronic device without access authority enters the machine room, which can improve the security of the first electronic device 1 because the second electronic device may be a terminal carried by a lawbreaker.
The second device identification group may also be referred to as a white list, but the processor has different processing manners for the electronic devices corresponding to the first device identification group and the second device identification group, and in order to represent the difference, the first electronic device identification group is represented by a primary white list, and the second device identification group is represented by a secondary white list.
For the electronic equipment corresponding to the first-level white list, when the electronic equipment enters the machine room, the alarm signal transmitter does not transmit an alarm signal to the alarm device 3; when leaving the machine room, the alarm signal transmitter transmits an alarm signal to the alarm device 3, and the alarm device 3 can control the alarm device to give an alarm and also can give an alarm to the management equipment 5. For the electronic equipment corresponding to the secondary white list, when the electronic equipment enters the machine room, the alarm signal transmitter does not transmit an alarm signal to the alarm device 3; when leaving the machine room, the alarm signal transmitter will not transmit the alarm signal to the alarm device 3. For devices whose device identification is not present in the primary and secondary whitelists, it is possible for them to be devices carried by a lawbreaker who stolen the first electronic device 1. In response to detecting that any one of the device identifiers is not present in the primary white list and the secondary white list, the alarm signal transmitter can transmit a first alarm signal to the alarm device 3, and the alarm device 3 controls the alarm device to give an alarm. At the same time, the alarm device 3 can send an alarm to the management apparatus 5.
The electronic device corresponding to the secondary white list is an electronic device carried by a manager or an electronic device carried by a developer. After the device identification of the electronic device carried by the manager and the device identification of the electronic device carried by the developer are added to the secondary white list, the manager and the developer can carry the electronic device corresponding to the secondary white list to freely go in and out of the machine room. And the lawbreakers carrying the electronic equipment corresponding to the non-secondary white list can be detected by the detecting device 2 after entering the machine room. Therefore, the effect that managers and developers can normally maintain the first electronic equipment and lawless persons carry the electronic equipment to enter the machine room and can be found by the detection device 2 is achieved, and the maintenance efficiency of the first electronic equipment is improved on the premise that the safety of the first electronic equipment is protected.
In one possible design, the safety monitoring system further includes: monitoring device 6, monitoring device 6 include image acquisition ware and image recognizer, and image acquisition ware and image recognizer electric connection. The image acquirer is used for acquiring an image of the position of at least one piece of first electronic equipment. The image recognizer is in communication connection with the alarm signal receiver. The image recognizer is used for responding to the image acquired by the image acquirer and including the target object and sending a third alarm signal.
With this design, the monitoring device 6 can acquire an image of the location where the first electronic device is located, and recognize the acquired image. When the target object is identified in the image, the monitoring device 6 can send a third alarm signal to the alarm device, so that an alarm is given out through the alarm to remind a manager that the target object exists in the machine room, and the safety of the first electronic equipment 1 in the machine room is improved.
The image acquirer is used for acquiring images in the machine room, and the image recognizer is used for performing image recognition on the images acquired by the image acquirer and determining whether a target object exists in the images, wherein the target object is a person who does not have access authority of the machine room. The image recognizer has a storage function, and images of personnel with machine room access rights are stored in the image recognizer. The image recognizer can compare the recognition result of the image acquired by the image acquirer with the image of the person with the machine room access authority, so as to determine whether the target object is included in the image acquired by the image acquirer. When the image recognizer recognizes that the target object is included in the image acquired by the image acquirer, the image recognizer can send a third alarm signal to the alarm device 3. In response to the third alarm signal, the alarm device 3 can control the alarm device to give an alarm, and in this design, the alarm device 3 can give a warning sound to scare people who do not have authority to enter the machine room and attract the attention of the manager.
In a possible design, the safety monitoring system further includes a management device 5, and the management device 5 includes an image receiver and an image display, and the image receiver is electrically connected to the image display. The monitoring device 6 further comprises an image transmitter, the image transmitter is electrically connected with the image acquirer, and the image transmitter is in communication connection with the image receiver. The image transmitter is used for transmitting the image acquired by the image acquirer to the image receiver. The image display is used for displaying the image received by the image receiver.
Under the design, the management device 5 can display the image acquired by the monitoring device 6, and a manager can see the image of the position of the first electronic device through the image display of the management device 5, so that the manager can determine whether an abnormal condition exists in the machine room at any time, the manager can remotely monitor and manage the machine room, and the unmanned security of the machine room is realized.
For the timing when the management apparatus 5 displays the image acquired by the monitoring device 6, the management apparatus 5 can display the image acquired by the monitoring device 6 in real time, so that the manager can view the situation in the machine room by viewing the management apparatus 5 at any time. The manager can also operate the management apparatus 5 by himself to acquire the image acquired by the monitoring device 6, thereby checking the situation in the machine room through the management apparatus 5. The monitoring device 6 can also send the acquired image to the management device 5 when the acquired image includes the target object, that is, the management device 5 can display the image acquired by the monitoring device 6 only when an abnormal condition occurs in the machine room, so that the consumption of network resources can be reduced.
In one possible design, the management device 5 further includes an image identifier, and the image identifier is electrically connected to the image display and the image receiver, respectively. The image identifier is used for identifying the target object in the image displayed by the image display.
For example, the image identifier can determine the coordinates of the target object in the image. Referring to fig. 3, the image recognizer can generate a marking frame 403 according to the coordinates of the target object 401 in the image 402, and the marking frame 403 is displayed on the image 402 through the image display, so that a manager can be reminded to see the appearance of the target object through the management device 5, and the tracking of the target object is facilitated.
In a possible design, the alarm device 3 can control the alarm device to issue an alarm, and also can issue an alarm to the management device 5, if the management device 5 is a mobile terminal carried by a manager, the alarm device 3 can issue an alarm to the mobile terminal carried by the manager, and the mobile terminal carried by the manager can display a prompt message, issue a prompt sound or generate a vibration after receiving the alarm.
In one possible design, if the first electronic device 1 is placed in a cabinet 4, which is placed in a room, the monitoring apparatus 6 is used to obtain at least one of an image of the location of the cabinet 4 in the room and an image of an entrance to the room.
Optionally, referring to fig. 3, the room includes two monitoring devices 6, one monitoring device 6 being mounted on the opposite side of the cabinet 4 and the other monitoring device 6 being mounted at the entrance to the room. One monitoring device 6 can acquire images of the location of the cabinet 4 in the room and the other monitoring device 6 can acquire images of the entrance to the room. The monitoring device 6 arranged at the position of the cabinet 4 can acquire images when a lawless person steals the first electronic device 1, and the monitoring device 6 arranged at the entrance of the machine room can timely discover the existence of the lawless person when the lawless person enters the machine room, so that a manager is informed in advance, and loss is reduced.
Certainly, the computer room can also include more monitoring devices 6, so that images in the computer room with more quantity can be obtained, the monitoring dead angle of the monitoring devices 6 is reduced, and the safety of the first electronic equipment in the computer room is improved.
In one possible design, the safety monitoring system further includes: the device comprises a central control machine and a cabinet 5, wherein the cabinet 5 is used for placing at least one piece of first electronic equipment. The central control machine is connected with the first end of the connecting line of the cabinet 5, the central control machine is used for recording the connecting state of the connecting line, and the second end of the connecting line is used for connecting the first electronic equipment.
Under the design, the central control machine can record the test condition of the first electronic equipment, so that the test condition can be traced when an abnormal condition occurs, and the processing efficiency when the abnormal condition occurs is improved.
For example, the connection line is a Universal Serial Bus (USB), and when the connection line is connected to the first electronic device 1, the central controller can record the current state of the connection line as 1. When the connection line is disconnected from the first electronic device 1, the central control machine can record the current state of the connection line as 0. The central control machine can store 1 and 0 and time corresponding to 1 and 0, thereby recording the connection state of the connection line.
In one possible design, the cabinet 5 includes an identity recognizer and a door opener, the identity recognizer is electrically connected with the door opener, and the door opener is connected with a door of the cabinet. The identity recognizer is used for recognizing the user in front of the cabinet; the cabinet opener is used for responding to the identity recognizer to recognize a legal user and controlling the cabinet door of the cabinet to be opened.
Optionally, the identity identifier is electrically connected to a cabinet door opener having a cabinet door opening capability, and optionally, the cabinet door opener is a hydraulic device, and the cabinet door can be controlled to open and close by the expansion and contraction of the hydraulic device. Optionally, the identity recognition ware is in fingerprint identity recognition ware, voiceprint identity recognition ware and iris identity recognition ware at least one, also can be the identity recognition ware of other types certainly, the embodiment of the utility model provides a do not restrict to this.
In one possible design, the identity identifier is communicatively coupled to the alert signal receiver, and the identity identifier is further configured to send a fourth alert signal in response to the number of times the illegal user is identified reaching the target threshold.
Under the design, the recognition device can recognize that the times of illegal users reach the target threshold, which means that persons without permission are likely to enter the machine room, the recognition device can send a fourth alarm signal to the alarm device 3, and the alarm device 3 controls the alarm to give an alarm or gives an alarm to the management equipment 5, so that a manager is reminded.
Through the embodiment of the utility model provides a technical scheme, through the cooperation of each device in the safety monitoring system, can place when first electronic equipment leaves the computer lab, send out the police dispatch newspaper through the alarm to remind computer lab managers to have first electronic equipment to leave the computer lab, the managers of being convenient for takes measures to retrieve the electronic equipment who leaves the computer lab, has improved first electronic equipment's security. Meanwhile, for developers, when the first electronic equipment in the cabinet is maintained, the security monitoring system is unaware, and the developers can normally maintain the first electronic equipment. That is to say, adopt the utility model provides a technical scheme can improve electronic equipment's maintenance efficiency under the prerequisite of protection first electronic equipment safety.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present invention is limited only by the appended claims.
Claims (10)
1. A safety monitoring system, comprising: the system comprises at least one piece of first electronic equipment, a detection device and an alarm device;
the first electronic device comprises a device identification transmitter for broadcasting a device identification of the first electronic device;
the detection device comprises an equipment identifier receiver, a processor and an alarm signal transmitter, wherein the processor is respectively electrically connected with the equipment identifier receiver and the alarm signal transmitter;
the device identification receiver is used for receiving the device identification broadcast by any device identification transmitter;
the processor is configured to compare a first device identifier group with the device identifiers received by the device identifier receiver, where the first device identifier group is composed of the device identifiers of the at least one first electronic device;
the alarm signal transmitter is used for responding to a first signal sent by the processor and transmitting a first alarm signal, wherein the first signal is triggered by that any equipment identifier in the first equipment identifier group is not received by the equipment identifier receiver;
alarm device includes alarm signal receiver and alarm, alarm signal receiver with alarm electric connection, alarm signal receiver with alarm signal sends the ware communication connection, alarm signal receiver is used for responding to and receives alarm signal, through the alarm sends out the police dispatch newspaper.
2. The safety monitoring system of claim 1, wherein the detection device further comprises a beacon transmitter and a power receiver, the beacon transmitter and the power receiver being electrically connected to the processor, respectively;
the first electronic device further comprises a beacon receiver electrically connected with the device identification transmitter;
the beacon transmitter is used for broadcasting a beacon;
the beacon receiver is used for receiving the beacon;
the device identification transmitter is further configured to broadcast a receive power at which the beacon receiver receives the beacon;
the power receiver is used for receiving the received power;
the processor is further configured to determine a distance between the first electronic device and the probe apparatus based on the received power and a transmit power when the beacon is broadcast by the beacon transmitter.
3. The security monitoring system of claim 1, wherein the processor is further configured to compare a second device identifier group with the device identifiers received by the device identifier receiver, the second device identifier group comprising device identifiers of a second electronic device with access rights;
the alarm signal transmitter is further configured to transmit a second alarm signal in response to a second signal transmitted by the processor, the second signal being triggered by the device identifier received by the device identifier receiver not being present in the second device identifier group.
4. The safety monitoring system of claim 1, further comprising: the monitoring device comprises an image acquirer and an image recognizer, wherein the image acquirer is electrically connected with the image recognizer;
the image acquirer is used for acquiring an image of the position of the at least one piece of first electronic equipment;
the image recognizer is in communication connection with the alarm signal receiver;
the image recognizer is used for responding to the image acquired by the image acquirer and including the target object, and sending a third alarm signal.
5. The safety monitoring system according to claim 4, further comprising a management device, the management device comprising an image receiver and an image display, the image receiver being electrically connected to the image display;
the monitoring device further comprises an image transmitter, the image transmitter is electrically connected with the image acquirer, and the image transmitter is in communication connection with the image receiver;
the image transmitter is used for transmitting the image acquired by the image acquirer to the image receiver;
the image display is used for displaying the image received by the image receiver.
6. The safety monitoring system of claim 5, wherein the management device further comprises an image identifier electrically connected to the image display and the image receiver, respectively;
the image identifier is used for identifying the target object in the image displayed by the image display.
7. The safety monitoring system of claim 1, wherein the detection device is a WiFi probe.
8. The safety monitoring system of claim 1, further comprising: the equipment comprises a central control machine and a cabinet, wherein the cabinet is used for placing the at least one piece of first electronic equipment;
the central control machine is connected with a first end of a connecting line of the cabinet, the central control machine is used for recording the connection state of the connecting line, and a second end of the connecting line is used for connecting the first electronic equipment.
9. The safety monitoring system according to claim 8, wherein the cabinet comprises an identity recognizer and a cabinet door opener, the identity recognizer is electrically connected with the cabinet door opener, and the cabinet door opener is connected with a cabinet door of the cabinet;
the identity recognizer is used for recognizing the user in front of the cabinet;
the cabinet opener is used for responding to the identity recognizer to recognize a legal user and controlling the cabinet door of the cabinet to open.
10. The security monitoring system of claim 9, wherein the identity identifier is communicatively coupled to the alert signal receiver, the identity identifier further configured to send a fourth alert signal in response to the number of times the illegal user is identified reaching the target threshold.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202021962609.4U CN213070103U (en) | 2020-09-09 | 2020-09-09 | Safety monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202021962609.4U CN213070103U (en) | 2020-09-09 | 2020-09-09 | Safety monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN213070103U true CN213070103U (en) | 2021-04-27 |
Family
ID=75557339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202021962609.4U Active CN213070103U (en) | 2020-09-09 | 2020-09-09 | Safety monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN213070103U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114360134A (en) * | 2021-12-08 | 2022-04-15 | 慧之安信息技术股份有限公司 | Intelligent machine room management method based on deep learning |
CN114360183A (en) * | 2021-12-29 | 2022-04-15 | 慧之安信息技术股份有限公司 | Automatic alarm method and device based on deep learning |
-
2020
- 2020-09-09 CN CN202021962609.4U patent/CN213070103U/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114360134A (en) * | 2021-12-08 | 2022-04-15 | 慧之安信息技术股份有限公司 | Intelligent machine room management method based on deep learning |
CN114360183A (en) * | 2021-12-29 | 2022-04-15 | 慧之安信息技术股份有限公司 | Automatic alarm method and device based on deep learning |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12081595B2 (en) | Monitoring system for securing networks from hacker drones | |
US10902707B1 (en) | Video monitoring and alarm verification technology | |
US20170300503A1 (en) | Method and apparatus for managing video data, terminal, and server | |
CN109872482A (en) | Wisdom security protection monitoring and managing method, system and storage medium | |
CN106157505A (en) | One is illegally entered the room alarm method and device | |
AU2019295856B2 (en) | Object tracking using disparate monitoring systems | |
CN213070103U (en) | Safety monitoring system | |
WO2017086613A1 (en) | Anti-theft apparatus for smart device | |
KR101981900B1 (en) | Security management system using face recognition and method thereof | |
CN105469476B (en) | A kind of building safety protection management method and system | |
US10419728B2 (en) | Monitoring system having personal information protection function and method thereof | |
CN110751774A (en) | Location sharing system based on intra-block security verification and wireless positioning | |
US9633533B2 (en) | System and method for interacting with digital video recorders through networking applications | |
CN113221589A (en) | Electric vehicle management method, device, system and computer readable storage medium | |
KR101666531B1 (en) | Patrol and vehicles management system | |
KR20130131574A (en) | Parked vehicle monitoring system and method | |
KR102084687B1 (en) | Security operation service method and system for detecting illegal photography | |
US10037637B1 (en) | Security system | |
KR20150087561A (en) | Fire safety management and security agency system, and method therefor | |
KR101065107B1 (en) | Local security service system using local guard | |
CN105957192A (en) | Access control system | |
CN109801472A (en) | Safety and protection monitoring method, apparatus, automatic driving vehicle and readable storage medium storing program for executing | |
JP2002165211A (en) | Security monitoring system using telecommunication network, program for making computer perform basic function of security monitoring system and recording medium storing the program | |
CN108122322A (en) | Gate inhibition and district management control device and method | |
CN210244560U (en) | Laboratory safety protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |