CN217360920U - Wearable security protection equipment - Google Patents

Wearable security protection equipment Download PDF

Info

Publication number
CN217360920U
CN217360920U CN202220961308.2U CN202220961308U CN217360920U CN 217360920 U CN217360920 U CN 217360920U CN 202220961308 U CN202220961308 U CN 202220961308U CN 217360920 U CN217360920 U CN 217360920U
Authority
CN
China
Prior art keywords
unit
control unit
information
emergency
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202220961308.2U
Other languages
Chinese (zh)
Inventor
颜寒松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kelong Shijing Biotechnology Shanghai Co ltd
Original Assignee
Kelong Shijing Biotechnology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kelong Shijing Biotechnology Shanghai Co ltd filed Critical Kelong Shijing Biotechnology Shanghai Co ltd
Priority to CN202220961308.2U priority Critical patent/CN217360920U/en
Application granted granted Critical
Publication of CN217360920U publication Critical patent/CN217360920U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model provides a wearable security protection equipment, include: the system comprises an interaction unit, a starting unit, a control unit and units required for security and protection emergency. The control unit starts a unit required for security emergency after the user interacts with the interaction unit and triggers the starting unit; the emergent required unit of security protection includes: the shooting unit is connected with the control unit and used for shooting and recording live information in an emergency state; a communication unit connected to the control unit for establishing communication connection with an external device; the control unit acquires the live information and transmits the live information to the external device through the communication unit. The scheme can shoot live information and send shot contents out in an emergency; the identity characteristics of the improper behavior implementer can be acquired according to the recorded live information, and the identity of the improper behavior implementer can be identified; warning the improper behavior enforcement person in time, and preventing the improper behavior from continuing; therefore, the utility model provides a can play safety protection effect's hardware equipment.

Description

Wearable security protection equipment
Technical Field
The utility model relates to a security protection technical field especially relates to a wearable security protection equipment.
Background
In life, serious events such as personal safety, property safety, environmental safety and the like are inevitably encountered, and how to carry out safety protection in the case of the events is a troublesome problem in the field. The conventional methods and tools employ or introduce a "brute force", such as a self-defense apparatus or a remote telephone alarm, to prevent improper behavior, but such methods and devices are not easily handled by the weak, or are easily injured in a conflict, or are difficult for remote police to act in time. Therefore, there is a need in the art for a security device that can provide timely security protection in case of a security-threatening malignancy.
SUMMERY OF THE UTILITY MODEL
In view of the above shortcomings in the prior art, the present invention provides a wearable security device for solving the technical problem of how to play a role of security protection in a malignant event.
In order to achieve the above object, the utility model provides a wearable security protection equipment, include: the system comprises an interaction unit, a starting unit, a control unit and a unit required for security and protection emergency; the control unit is connected with the interaction unit and the starting unit so as to start a unit required for security emergency after a user interacts with the interaction unit and triggers the starting unit; the emergent required unit of security protection includes: the shooting unit is connected with the control unit and is used for shooting and recording live information in an emergency state; the communication unit is connected with the control unit and used for establishing communication connection with external equipment; and after acquiring the live information in the emergency state from the shooting unit, the control unit sends the live information to the remote external equipment through the communication unit.
In some embodiments of the present invention, the system further comprises an identification unit connected to the control unit for obtaining the identity of the person performing the inappropriate behavior in the live information of the emergency state recorded by the recording unit, and optionally the identity of the person performing the inappropriate behavior.
In some embodiments of the present invention, the identification unit comprises a biometric module for identifying identity characteristics; or the communication unit sends the live information in the critical state to the external equipment, and after the external equipment and the system recognize the identity, the identity recognition result is fed back to the recognition unit.
In some embodiments of the present invention, the biometric identification module comprises a physiological characteristic identification module and/or a behavior characteristic identification module; the physiological characteristic identification module comprises any one or more of a face identification module, a fingerprint identification module and an iris identification module; the behavior characteristic recognition module comprises any one or more of a handwriting recognition module, a voice recognition module and a gait recognition module.
In some embodiments of the present invention, the system further comprises a warning advisory unit connected to the control unit for warning the surrounding and/or the user of inappropriate behavior in the critical state.
In some embodiments of the present invention, the warning advisory unit includes any one or combination of a display subunit, a voice play subunit, and a speaker subunit.
In some embodiments of the present invention, the warning advisory unit sends a warning to the surrounding and/or to the enforcement of the inappropriate behavior in the critical state, including any one or more of the following warning ways: sending warning persuasion information to a communication terminal of a user and displaying the warning persuasion information on a terminal screen for the user to display to the periphery; carrying out on-site voice broadcast on the illegal behavior implementer through an automatic voice broadcast system; and sending warning persuasion information to the communication terminal of the identified improper behavior implementer through a preset communication platform.
In some embodiments of the present invention, the device further comprises a positioning unit connected to the control unit for positioning the current position of the device.
In some embodiments of the present invention, the power supply unit is further included, and each unit in the connection device is configured to provide energy for driving.
In some embodiments of the present invention, the device further comprises an acousto-optic electrical unit connected to the control unit, including a speaker for emitting sound, a light emitting device for emitting flash light, an electric shock device for emitting electric shock pulses of different degrees through adjustable current and voltage, or a mist releasing device for releasing special mist.
As above, the utility model relates to a pair of wearable security protection equipment has following beneficial effect: after the utility model is started by one key, live information can be shot and recorded under emergency, and shot and recorded contents are sent out; furthermore, the identity characteristics of the improper behavior implementer can be obtained according to the shot live information and the identity of the improper behavior implementer can be identified; the system can also give a warning to the illegal action implementer in time and prevent the continuation of the illegal action; this equipment still possesses the locate function, can in time send away the current position of equipment. Therefore, the utility model provides a can play safety protection effect's hardware equipment.
Drawings
Fig. 1 is a schematic view of an internal structure of a wearable security device in an embodiment of the present invention.
Fig. 2 is an appearance schematic diagram of a wearable security device in an embodiment of the present invention.
Detailed Description
The following description is provided for illustrative purposes, and other advantages and features of the present invention will become apparent to those skilled in the art from the following detailed description.
It should be understood that the structure, ratio, size and the like shown in the drawings attached to the present specification are only used for matching with the content disclosed in the specification, so as to be known and read by those skilled in the art, and are not used for limiting the limit conditions that the present invention can be implemented, so that the present invention has no technical essential meaning, and any structure modification, ratio relationship change or size adjustment should still fall within the scope covered by the technical content disclosed in the present invention without affecting the function and the achievable purpose of the present invention. The following detailed description is not to be taken in a limiting sense, and the scope of embodiments of the present application is defined only by the claims of the issued patent. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. Spatially relative terms, such as "upper," "lower," "left," "right," "lower," "below," "lower," "above," "upper," and the like, may be used herein to facilitate describing one element or feature's relationship to another element or feature as illustrated in the figures.
In the present invention, unless otherwise expressly specified or limited, the terms "mounted," "connected," "secured," "retained," and the like are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood according to specific situations by those of ordinary skill in the art.
Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," and/or "comprising," when used in this specification, specify the presence of stated features, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, operations, elements, components, items, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions or operations are inherently mutually exclusive in some way.
The utility model provides a wearable security protection equipment aims at the scene of sending out a case especially the beginning stage of sending out a case, lets the improper action implementer know oneself identity and has been exposed, and its improper action has been forensics, and the evidence can not destroyed, further implements the improper action and can let it escape follow-up sanction to make the improper action implementer probably stop the improper action.
In order to make the objects, technical solutions and advantages of the present invention more clearly understood, the technical solutions in the embodiments of the present invention are further described in detail through the following embodiments in combination with the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, the embodiment of the present invention provides an internal structure diagram of a wearable security device.
It should be noted that the wearable security protection equipment that this embodiment provided can make solitary wearable equipment, also can integrate in other portable or wearable equipment that are difficult for robbing the destruction, for example intelligent wrist-watch, intelligent bracelet, intelligent waistband etc.. Fig. 2 shows an appearance schematic diagram of the intelligent watch type wearable security device, and a user can click "start security" in an emergency, so that an emergency process of security can be started, and a series of units, such as a shooting unit, an identification unit, a communication unit and the like, are called, so that a function of timely security protection is achieved. The above figures are for reference only and are not limiting.
Specifically, the wearable security device is composed of the following units: the interactive unit 101, the starting unit 102, the control unit 103, the recording unit 104, the communication unit 105, the recognition unit 106, the warning advisory unit 107, and the like, and the constituent elements of each unit are also listed below.
The interaction unit 101 includes an input subunit, an output subunit, and a display subunit, and is configured to establish interaction between a user and a device, where a specific example of the interaction unit is a touch screen interaction device or a voice control interaction device. In a scenario applicable to this embodiment, the establishing, by the interaction unit, the interaction between the user and the device mainly means that the user sets various emergency schemes by operating the interaction unit 101, selects various elements in the emergency schemes, and inputs personal information of the user or selects a preference. It should be noted that the interaction unit 101 may be disposed in the device body of the wearable device of this embodiment, or may be disposed in other portable or wearable devices, and completes the interaction process by establishing a communication connection with the device body.
The starting unit 102 is a physical key or a touch key, and is configured to start a required emergency process after responding to a key operation of a user. Touch button wherein can pass through button or touch-sensitive screen that set up on the equipment body of wearable security protection equipment realize, also can through with wearable security protection equipment communication connection's electronic terminal APP realizes. After the user presses the physical button or touch type starting unit 102, the emergency process is triggered, and the equipment can call the emergency process; it should be noted that the emergency process may be a process program pre-stored in the device, the starting unit 102 in this embodiment is a hardware unit for triggering the emergency process, and a software method used by the emergency process is not included in the present invention.
The control unit 103 is connected to the interaction unit 101 and the starting unit 102 to obtain the input information of the interaction unit 101 and the starting state of the starting unit 102. The control unit 103 may be an arm (advanced RISC machines) controller, an fpga (field Programmable Gate array) controller, an soc (system on chip) controller, a dsp (digital Signal processing) controller, or an mcu (microcontroller unit) controller.
The recording unit 104 is connected to the control unit 103 and is used for recording the live information in the critical state. After the starting unit 102 starts a required emergency process after responding to a key operation of a user, the control unit 103 obtains a starting state of the starting unit 102 and controls the recording unit 104 to automatically record.
In an application scenario of the present embodiment, the content recorded by the recording unit 104 includes, but is not limited to, multimedia such as video, audio, and pictures. The camera unit 104 can be a camera module that includes a camera device, a storage device, and a processing device. The image capturing device includes but is not limited to: cameras, video cameras, camera modules integrated with optical systems or CCD chips, camera modules integrated with optical systems and CMOS chips, and the like. The recording unit 104 can automatically focus, and can better acquire important information such as identity information, physical and appearance characteristics, behavior characteristics, event passage or house number, license number and the like even if people, objects and surrounding environments to be recorded are not accurately focused in a low-illumination environment.
Further, a timing module is provided in the recording unit 104 to automatically record and transmit live contents, such as data of surrounding people and environment, as a travel record for use as needed according to a preset frequency. The data obtained by timing monitoring can be automatically processed, extracted, sorted and updated regularly by combining with some existing software technologies, the recorded photos and voiceprints of the personnel are matched with the personnel in the address book by combining with the inquiry of a user, and the address book containing the photos and the voiceprints is automatically sorted and continuously updated so as to perfect a comparison database during identity recognition. If the database of the equipment of a plurality of users is continuously perfected, the database of the equipment provider is continuously perfected and enriched by authorized use, and the identification efficiency can be obviously improved.
The communication unit 105 is connected to the control unit 103, and is configured to send the recording information of the recording unit 104 and the basic information, the positioning information, the critical condition information, etc. of the user to a designated party, such as a user's relatives and friends, an equipment provider, an police or other main bodies, and the information interaction medium may be a mailbox, an APP client, a WeChat, a short message, a preset cloud storage space, an equipment terminal, etc. The communication unit 105 may be any one or a combination of a bluetooth communication module, an infrared communication module, a 2G/3G/4G/5G communication module, an NB-IoT communication module, a RoLA communication module, a ZigBee communication module, a MavLink communication module, a WIFI communication module, an NFC communication module, a GPRS communication module, a GSM communication module, and an ethernet communication module. It should be noted that the communication unit 105 may transmit the recorded information by itself in a long distance, or may transmit the recorded information to a nearby device through short-range communication, and then the nearby device transmits the recorded information to a far end in a long distance.
The identification unit 106 is connected to the control unit 103 and is configured to identify the person in the recording information of the recording unit 104. The recognition unit 106 includes a biometric module, which may be a face recognition module, a fingerprint recognition module, an iris recognition module, a voice recognition module, etc., and these modules are designed to perform personal identity authentication by using intrinsic physiological characteristics (such as face, fingerprint, iris) and behavioral characteristics (such as handwriting, voice, gait, etc.) of a human body through computer and optical, acoustic, biosensor, and biometric principles, etc.
In another implementation scheme, in order to improve the recognition efficiency and reduce the local calculation amount of the equipment, the recorded information is sent to a remote server, the identity is recognized by the remote server, and the identity recognition result is sent to the recognition unit 106; the identification result includes but is not limited to basic information (such as the name, sex, identification number, native place, height and other basic characteristics) or communication information of the improper behavior implementer.
The warning advisory unit 107 is connected with the control unit 103 and comprises any one or a combination of a display subunit, a voice playing subunit and a loudspeaker subunit, and is used for giving out warning to the periphery and/or to the improper behavior implementer in a critical state. Specifically, the warning advisory unit 107 is provided with a display function, an automatic voice function, and a speaker function, and can alert surrounding persons of the occurrence of an emergency or alert an inappropriate behavior performer to advisory and deter the person from stopping the inappropriate behavior when the emergency occurs.
Further, the warning advisory unit 107 issues warning to the surrounding and/or to the inappropriate behavior implementer in a critical state, including any one or more of the following warning approaches: sending warning persuasion information to a communication terminal of a user and displaying the warning persuasion information on a terminal screen for the user to display to the periphery; carrying out on-site voice broadcast on the illegal behavior implementer through a voice broadcast system; and sending warning persuasion information to the communication terminal of the identified improper behavior implementer through a preset communication platform.
In some examples, the wearable security device further includes a positioning unit 108 connected to the control unit 103 for positioning a current location. The positioning unit 108 includes any one or a combination of a GPS positioning module, a beidou satellite positioning module, a base station positioning module, an electronic map positioning module, a galileo satellite positioning module, and a GLONASS satellite positioning module.
In some examples, the wearable security device further comprises a power supply unit 109 connected to each unit in the device for providing energy drive. The power supply unit 109 is, for example, a battery such as a lithium battery, a dry battery, a lead storage battery, or the like.
In some examples, the wearable security device further includes an acousto-optic electrical unit 110 connected to the control unit 103, for performing any one or more of the following operations after being triggered: sounding, flashing, electric shock and releasing aerial fog. The acousto-optic electrical unit 110 specifically includes: a speaker for emitting sound, a light emitting device for emitting flash light, an electric shock device for emitting electric shock pulses of various degrees by adjustable current and voltage, a mist releasing device for releasing special mist such as wolf proof mist, and the like.
The above description explains and explains each unit in the wearable security device in detail. Hereinafter, the safety protection process of the wearable safety protection device will be further described.
The safety protection process of wearing security protection equipment includes: presetting, starting, shooting, remote transmission, identification, warning and refunding and the like.
In the presetting step: the user sets an emergency safety protection scheme in advance through the interaction unit 101 and inputs related information. It should be understood that a set of emergency scenarios may include a combination of multiple element options for the user to select and set parameters in advance according to his own situation or preference, or one or more scenarios may be built in the device itself for operation or selection. The relevant information includes the user's personal identity, phone number, preferences, remotely specified storage space, name of his emergency contacts, contact details, etc. In addition, the interaction unit 101 itself is a hardware unit, which can operate alone or combine with existing software to implement a certain function, and software technologies such as emergency schemes, preference parameter setting, information input, etc. are designed to be existing.
In the start-up step: when the user encounters an emergency, the user can start the starting unit 102 by one key or can quickly start the emergency process of safety protection by other means. However, it should be understood that the emergency process is pre-stored in the device, and how the process itself is written is not within the scope of the present invention.
In the recording step: after the user presses the starting unit 102, the control unit 103 controls the recording unit 104 to automatically record live information in an emergency state, including rapidly recording the improper behavior implementing person and its behavior process, related voice, surrounding environment, and the like, so as to obtain key information such as identity information, face photos, body appearance characteristics, behavior characteristics, event passage or house number, license number, and the like.
In the remote transmission step: after the live information is recorded by the recording unit 104, the information is automatically transmitted remotely through the communication unit 105, and the information such as time, location, party information, event passage, surrounding environment and the like is sent to and stored in a preset cloud storage space, a service platform of an equipment provider, a preset emergency contact or police for subsequent use and processing. The information is transmitted to the corresponding platform remotely, so that efficient processing and more resources calling are facilitated, corresponding evidences and information are not damaged by a baddie on the spot, and better protection and deterrence effects are achieved.
In the identification step: the identification unit 106 identifies the identity information of the inappropriate behavior implementer from the recorded information, specifically, the actual identity of the inappropriate behavior implementer, including but not limited to name, native place, certificate number, communication mode, etc., through the recorded characteristic information pictures such as human face pictures, vehicle license plates, etc., and video, audio containing person name, or voiceprint, etc. The identification unit can be configured locally by the equipment, but in order to improve efficiency, after receiving the shooting information, the equipment provider can identify the shooting information by using a system configured in a cloud background remotely, or a service platform of the equipment provider can call identification systems of other service providers to assist in completing an identification process, and after obtaining a result, the identification unit feeds back the result to a related party.
Further, the recognition unit 106 may implement the following process based on the existing software technology: the recorded characteristic information is compared with identity information in an original database for identification, the database stores mass data, in order to quickly identify real identity in a short time, besides the improvement of the operation speed, the identity database can be graded according to the most possible sequence, and more possible identity information in the database is searched and compared in sequence from small to large, so that the efficiency is improved. For example, the identity information in the address book of the user can be searched and compared, and the recognition efficiency is high under the condition that the improper behavior implementer is an acquaintance of the user; then searching and comparing the identity information of nearby people found according to the current position of the user, so that the identification efficiency is higher; if not, then searching and comparing the identity information database in the service platform of the device provider to identify the identity of the improper actor; if not, then according to the agreement, calling the larger database of the identification information of the external service provider, such as the database of the identification information of the railway system, or even calling the database of the identification information of the national public security system, or sending the request of paid identification to the related service provider, so as to complete the identification process.
In the warning advisory step: subsequent alert advisories are made if the identity of the misbehaving implementer is identified, including one or more of the following:
(1) carry out on-the-spot automatic voice broadcast to improper action person with automatic pronunciation and speaker system, the broadcast content can be for example: when a person in Liu is in the scene of a case, the security system detects that the person is in the scene of the case, small Zhang in the scene meets danger, related evidence is already mastered, the person is asked to immediately hang on a cliff to stop improper behavior, or the small Zhang is given to help, and the time for fixing sheep is not late. The specific content is automatically and intelligently generated according to the information of the identified improper actor, the information of the user and other related information and according to the preset dialect and the template.
(2) And automatically dialing a phone or sending information to a mobile phone or an APP client of the identified improper actor by using a communication platform of an equipment provider, the equipment worn by the user, a preset communication tool of an emergency contact person or other equipment platforms, and broadcasting related warning advising contents. The information can be directly sent to the equipment number and the client side, and the deterrent effect can be achieved.
(3) Automatically sending information such as 'warning counseling content' to a mobile phone of a user, displaying the information on an equipment screen of the user, and taking the information to an unpopular person by the user for watching; or automatically dialing the telephone of the user, and taking the improper agent to answer by the user to warn and persuade the improper agent.
If the real identity of the improper behavior executor cannot be immediately identified, according to a preset scheme, the warning advisory is still automatically initiated after a period of remote transmission (for example, after being set to 3 seconds), and the corresponding warning advisory content may be: "you are in danger in the process of small-size stretch, you are on the spot, and the photos, the appearances, the identity characteristics and the behavior process of your people are already sent to the headquarters of the system, and please immediately stop the improper behavior, or the sheep death is strengthened, so the system can be irreconcilable, if the system is alone, the system is magnificent. Although this is not as straightforward as calling for, it can also provide a good deterrent and persuasive effect.
Once the equipment is started, the equipment automatically performs a periodic cycle at intervals according to the process of recording, remote transmission, identification and warning advocation until the equipment is shut down after the user is subjected to safety certification. Once circulating, the equipment system can intelligently adjust and automatically generate warning advising modes and contents according to the latest information and the identification condition so as to achieve better danger prevention effect.
It should be noted that, in a preferred scheme, the wearable security device generally includes at least four key links, namely, a recording unit, a communication unit, an identification unit, and a warning advisory unit, but actually, the design may also be simplified, for example, as follows:
(1) wearable security protection equipment is equipped with and shoots with video-corder unit, communication unit, warning and advises the unit, but does not have the identification element, as before, like this though there is not the effect of standard process obvious, still can play better safety protection effect.
(2) The wearable security equipment is provided with a shooting unit and a communication unit, but is not provided with a warning advising unit and an identifying unit. The essence is that the safety evidence obtaining function is completed. When the user feels no reassurance on safety but the safety threat does not really occur, the functions of shooting, recording and remote transmission can be started, emergency after preparation can be realized, and the risk of misjudgment can be avoided. Different from general evidence collection, the shooting and remote transmission can well protect the evidence from being damaged and lost on the spot, so that the method is safer and can start the subsequent process in time.
For the two simplified schemes, which scheme and program are to be adopted specifically may be preset by the interaction unit, or the scheme may be built into the device or APP application, and different keys are configured for starting accordingly.
It is worth emphasizing again that the utility model provides a wearable security protection equipment is a hardware device, and each constitutional unit in this hardware device is also the hardware unit, and it can use alone, and certainly also can combine some existing software or procedure to use, but the utility model discloses does not relate to the renewal of any software technology itself.
In conclusion, the whole working process of the utility model is automatically completed by the equipment, the use is convenient, the work is high-efficiency and easy to master, and even the weak can easily use the device under the condition of confusion; the use difficulty is low, and particularly the strong force is not used, so that the two parties cannot be additionally injured due to the use of the strong force; the early-stage quick response on site can stop the improper behavior in time, the response is quicker than that of remote alarm, the case can be killed in the bud state effectively, and the injury or damage is controlled in time; the system also can protect and save the improper actor, and the improper actor is lost to know the way, the dead sheep is reinforced, the mistake is not made, the mistake is made little, the error is corrected in time and the improper actor is prevented from going farther and farther on the wrong path through warning and persuasion; the occurrence probability of the bad events is reduced, the bad events are not expanded continuously, and the construction of a more harmonious society is facilitated. The utility model discloses effectively overcome all kinds of shortcomings in the prior art and had high industry value.
The above embodiments are merely illustrative of the principles and effects of the present invention, and are not to be construed as limiting the invention. Any person skilled in the art can modify or change the above embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which may be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (10)

1. A wearable security device, comprising:
the system comprises an interaction unit, a starting unit, a control unit and a unit required for security and protection emergency;
the control unit is connected with the interaction unit and the starting unit so as to start units required for security protection emergency after a user interacts with the interaction unit and triggers the starting unit; the emergent required unit of security protection includes:
the shooting unit is connected with the control unit and is used for shooting and recording live information in an emergency state;
the communication unit is connected with the control unit and used for establishing communication connection with external equipment;
and after acquiring the live information in the emergency state from the shooting unit, the control unit sends the live information to the external equipment through the communication unit.
2. The wearable security device of claim 1, further comprising an identification unit connected to the control unit and configured to obtain identity characteristics of the misbehavior implementer in the live information recorded by the recording unit in the critical state and identify the identity of the misbehavior implementer.
3. The wearable security device of claim 2, wherein the identification unit comprises a biometric module to identify identity features; or the communication unit sends the live information in the emergency state to the external equipment, and after the external equipment and the system recognize the identity, the identity recognition result is fed back to the recognition unit.
4. The wearable security device of claim 3, wherein the biometric module comprises a physiological characteristic identification module and/or a behavioral characteristic identification module; the physiological characteristic identification module comprises any one or more of a face identification module, a fingerprint identification module and an iris identification module; the behavior characteristic recognition module comprises any one or more of a handwriting recognition module, a voice recognition module and a gait recognition module.
5. The wearable security device of claim 1, further comprising a warning advisory unit connected to the control unit for alerting the surrounding and/or the enforcement of inappropriate behavior in critical situations.
6. The wearable security device of claim 5, wherein the warning advisory unit comprises any one or a combination of a display sub-unit, a voice play sub-unit, and a speaker sub-unit.
7. The wearable security device of claim 5, wherein the warning advisory unit issues warnings to the surrounding and/or to the enforcement of inappropriate behavior in critical situations, including any one or more of the following:
sending warning persuasion information to a communication terminal of a user and displaying the warning persuasion information on a terminal screen for the user to display to the periphery;
carrying out on-site voice broadcast on the improper behavior implementer through an automatic voice broadcast system;
and sending warning persuasion information to the communication terminal of the identified improper behavior implementer through a preset communication platform.
8. The wearable security device of claim 1, further comprising a positioning unit connected to the control unit for positioning a current location of the device.
9. The wearable security device of claim 1, further comprising a power supply unit connected to each unit in the device for providing energy to drive.
10. The wearable security device of claim 1, further comprising an acousto-optic electrical unit connected to the control unit, wherein the acousto-optic electrical unit comprises a speaker for emitting sound, a light emitting device for emitting flash light, an electric shock device for emitting electric shock pulses of different degrees by adjustable current and voltage, or a mist releasing device for releasing special mist.
CN202220961308.2U 2022-04-15 2022-04-15 Wearable security protection equipment Active CN217360920U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202220961308.2U CN217360920U (en) 2022-04-15 2022-04-15 Wearable security protection equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202220961308.2U CN217360920U (en) 2022-04-15 2022-04-15 Wearable security protection equipment

Publications (1)

Publication Number Publication Date
CN217360920U true CN217360920U (en) 2022-09-02

Family

ID=83057331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202220961308.2U Active CN217360920U (en) 2022-04-15 2022-04-15 Wearable security protection equipment

Country Status (1)

Country Link
CN (1) CN217360920U (en)

Similar Documents

Publication Publication Date Title
US10979636B2 (en) Triggering actions based on shared video footage from audio/video recording and communication devices
US7840203B2 (en) Process and system for automatically transmitting audio/video content from an electronic device to desired recipient(s)
US9704377B2 (en) Systems and methods for managing an emergency situation
US8606316B2 (en) Portable blind aid device
WO2016169095A1 (en) Terminal alarm method and apparatus
US9615235B2 (en) Wireless personal safety device
US20140120977A1 (en) Methods and systems for providing multiple coordinated safety responses
US20100027766A1 (en) Automatic Transmission of Audio and/or Video Content To Desired Recipient(s)
US20120003953A1 (en) Emergency call device
GB2483370A (en) Ambient audio monitoring to recognise sounds, music or noises and if a match is found provide a link, message, alarm, alert or warning
CN106231052B (en) Electronic equipment and help calling method thereof
CN113093578A (en) Control method and device, electronic equipment and storage medium
US10462642B1 (en) Panic mode management in a communication device
CN217360920U (en) Wearable security protection equipment
US20170098118A1 (en) Face recognition using concealed mobile camera
CN109981890B (en) Reminding task processing method, terminal and computer readable storage medium
CN111353454A (en) Data processing method and device and electronic equipment
CN109243447A (en) Voice sends triggering method and device
WO2018068568A1 (en) Method and apparatus for reminding during call, and mobile terminal
CN111757039B (en) Video call method of wearable device and wearable device
KR101170733B1 (en) Device calling for help through controlling audible frequency bands and system using thereof
EP3255619A1 (en) Wireless personal safety device
CN215911003U (en) Multi-channel alarm device with one-key starting positioning and shooting and recording functions
CN218848878U (en) Wearable personal safety protection equipment
CN110659603A (en) Data processing method and device

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant